UM

Browse/Search Results:  1-10 of 13 Help

Selected(0)Clear Items/Page:    Sort:
Blockchain-enabled cross-border insurance: from legal issues, solution design, to implementation Journal article
Jiaxin Ran, Dechuan Li, Qixin Zheng, JEROME YEN, Yingjie Xue. Blockchain-enabled cross-border insurance: from legal issues, solution design, to implementation[J]. Blockchain, 2024, 2(1).
Authors:  Jiaxin Ran;  Dechuan Li;  Qixin Zheng;  JEROME YEN;  Yingjie Xue
Adobe PDF | Favorite |  | Submit date:2024/09/12
Cross-border Insurance  Blockchain  Cross-chain  Tee  Data Security  
Vendor selection in the wake of data breaches: A longitudinal study Journal article
Wang, Qian, Jiang, Shenyang, Ngai, Eric W.T., Huo, Baofeng. Vendor selection in the wake of data breaches: A longitudinal study[J]. Journal of Operations Management, 2024, 70(4), 568-599.
Authors:  Wang, Qian;  Jiang, Shenyang;  Ngai, Eric W.T.;  Huo, Baofeng
Favorite | TC[WOS]:4 TC[Scopus]:4  IF:6.5/9.2 | Submit date:2024/05/16
Attention-based View  Data Breach  Electronic Medical Record Systems  Information Security  Information Technology Outsourcing  Vendor Selection  
Predicting Power Outage at Low-Lying Area Substations During Storm Surge Disasters Using Multi-Grained Cascaded Forest Journal article
Liu, Fengrui, Lao, Keng Weng, Gao, Liang, Lei, Chi Cheng, Hu, Xiaorui, Li, Yang. Predicting Power Outage at Low-Lying Area Substations During Storm Surge Disasters Using Multi-Grained Cascaded Forest[J]. IEEE Transactions on Industry Applications, 2024.
Authors:  Liu, Fengrui;  Lao, Keng Weng;  Gao, Liang;  Lei, Chi Cheng;  Hu, Xiaorui; et al.
Favorite | TC[Scopus]:2  IF:4.2/4.5 | Submit date:2024/05/16
Artificial Intelligence  Data Collection  Data Mining  Digital Twins  Feature Extraction  Power Supplies  Power System Security  Sea Measurements  Storm Surge  Surges  Tropical Cyclones  Urban Areas  Vectors  
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT Journal article
Rezaeibagha, Fatemeh, Mu, Yi, Huang, Ke, Chen, Lanxiang, Zhang, Leyou. Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT[J]. IEEE Transactions on Services Computing, 2023, 16(3), 1664-1672.
Authors:  Rezaeibagha, Fatemeh;  Mu, Yi;  Huang, Ke;  Chen, Lanxiang;  Zhang, Leyou
Favorite | TC[WOS]:4 TC[Scopus]:6  IF:5.5/5.9 | Submit date:2024/01/10
Cloud Computing  Data Security  Homomorphic Encryption  Internet Of Things  
Firm diversity and data breach risk: A longitudinal study Journal article
Wang, Qian, Ngai, Eric W.T.. Firm diversity and data breach risk: A longitudinal study[J]. JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2022, 31(4), 101743.
Authors:  Wang, Qian;  Ngai, Eric W.T.
Favorite | TC[WOS]:7 TC[Scopus]:6  IF:8.7/18.9 | Submit date:2023/01/30
Data Breach Risk  Diversity Type  Firm Diversity  Information Security  Managerial Ability  Resource-based View  
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs Journal article
Gu, Ke, Dong, Xin Ying, Jia, Wei Jia. Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs[J]. IEEE Transactions on Cloud Computing, 2022, 10(2), 1215-1232.
Authors:  Gu, Ke;  Dong, Xin Ying;  Jia, Wei Jia
Favorite | TC[WOS]:30 TC[Scopus]:28  IF:5.3/4.6 | Submit date:2022/08/05
Data Security  Fog Computing  Malicious Node  Reputation  Vanets  
Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud Journal article
Ullah, Fasee, Pun, Chi Man. Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud[J]. IEEE Transactions on Computational Social Systems, 2022, 11(3), 3090-3107.
Authors:  Ullah, Fasee;  Pun, Chi Man
Favorite | TC[WOS]:4 TC[Scopus]:4  IF:4.5/4.6 | Submit date:2022/08/05
Auditing  Authenticator  Cloud Computing  Costs  Data Privacy  Dynamics  Error Identification  Organizations  Parity Bits  Privacy  Recovery  Security  Servers  Tag  Time Division Multiplexing  User Revocation.  
Secure Data Sequence Query Framework Based on Multiple Fogs Journal article
Gu, Ke, Wu, Na, Yin, Bo, Jia, Weijia. Secure Data Sequence Query Framework Based on Multiple Fogs[J]. IEEE Transactions on Emerging Topics in Computing, 2021, 9(4), 1883-1900.
Authors:  Gu, Ke;  Wu, Na;  Yin, Bo;  Jia, Weijia
Favorite | TC[WOS]:18 TC[Scopus]:20  IF:5.1/4.5 | Submit date:2022/05/13
Data Sequence Query  Fog Computing  Merkle Hashing Tree  Security  
Secure Data Query Framework for Cloud and Fog Computing Journal article
Gu, Ke, Wu, Na, Yin, Bo, Jia, Weijia. Secure Data Query Framework for Cloud and Fog Computing[J]. IEEE Transactions on Network and Service Management, 2020, 17(1), 332-345.
Authors:  Gu, Ke;  Wu, Na;  Yin, Bo;  Jia, Weijia
Favorite | TC[WOS]:69 TC[Scopus]:68  IF:4.7/4.6 | Submit date:2021/12/06
Cloud Computing  Data Query  Fog Computing  Security  
DeMalC: A feature-rich machine learning framework for malicious call detection Conference paper
Yuhong Li, Dongmei Hou, Aimin Pan, Zhiguo Gong. DeMalC: A feature-rich machine learning framework for malicious call detection[C], 2017, 1559-1567.
Authors:  Yuhong Li;  Dongmei Hou;  Aimin Pan;  Zhiguo Gong
Favorite | TC[WOS]:3 TC[Scopus]:5 | Submit date:2019/02/12
Antifraud App  Data Mining For Social Security  Malicious Call Detection