Extending the technology acceptance model to account for social influence: Theoretical bases and empirical validation

Y Malhotra, DF Galletta - … on systems sciences. 1999. HICSS-32 …, 1999 - ieeexplore.ieee.org
The Technology Acceptance Model (TAM) represents an important theoretical contribution
toward understanding IS usage and IS acceptance behaviors. However, as noted by several …

Rooting our rumor sources in online social networks: The value of diversity from multiple observations

Z Wang, W Dong, W Zhang… - IEEE Journal of Selected …, 2015 - ieeexplore.ieee.org
This paper addresses the problem of rumor source detection with multiple observations,
from a statistical point of view of a spreading over a network, based on the susceptible …

Malicious Web traffic detection for Internet of Things environments

B Yong, X Liu, Q Yu, L Huang, Q Zhou - Computers & Electrical Engineering, 2019 - Elsevier
Abstract The Internet of Things (IoT) is gradually becoming an infrastructure, providing a
wide range of applications, from health monitoring to industrial control and many other social …

Hmm-web: A framework for the detection of attacks against web applications

I Corona, D Ariu, G Giacinto - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Nowadays, the web-based architecture is the most frequently used for a wide range of
internet services, as it allows to easily access and manage information and software on …

Formal analysis of the kaminsky DNS cache-poisoning attack using probabilistic model checking

N Alexiou, S Basagiannis, P Katsaros… - 2010 IEEE 12th …, 2010 - ieeexplore.ieee.org
We use the probabilistic model checker PRISM to formally model and analyze the highly
publicized Kaminsky DNS cache-poisoning attack. DNS (Domain Name System) is an …

Anomaly detection in bacnet/ip managed building automation systems

M Peacock - 2019 - ro.ecu.edu.au
Abstract Building Automation Systems (BAS) are a collection of devices and software which
manage the operation of building services. The BAS market is expected to be a $19.25 …

Multi-observer privacy-preserving hidden markov models

HX Nguyen, M Roughan - IEEE transactions on signal …, 2013 - ieeexplore.ieee.org
Detection of malicious traffic and network health problems would be much easier if Internet
Service Providers (ISPs) shared their data. Unfortunately, they are reluctant to share …

Owleye: An advanced detection system of web attacks based on hmm

X Liu, Q Yu, X Zhou, Q Zhou - 2018 IEEE 16th Intl Conf on …, 2018 - ieeexplore.ieee.org
Nowdays web services plays an important part in our daily life, and the security of web
servers and applications has become one of the key topics in cyber security. Web request …

A hidden markov model combined with markov games for intrusion detection in cloud

P Narwal, D Kumar, SN Singh - Journal of Cases on Information …, 2019 - igi-global.com
Cloud computing has evolved as a new paradigm for management of an infrastructure and
gained ample consideration in both industrial and academic area of research. A hidden …

Intrusion detection in computer systems using multiple classifier systems

I Corona, G Giacinto, F Roli - Supervised and Unsupervised Ensemble …, 2008 - Springer
Summary Multiple Classifier Systems (MCS) have been applied successfully in many
different research fields, among them the detection of intrusions in computer systems. As an …