-
Notifications
You must be signed in to change notification settings - Fork 0
/
aisec.html
32 lines (32 loc) · 4.71 KB
/
aisec.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
<html>
<head>
<title>References</title>
</head>
<body>
<b>References for: </b>EAGER: SaTC AI-Cybersecurity: A Secure AI-Enabled Social-Physical Sensing Framework <br />
1. Crooks, A., Croitoru, A., Stefanidis, A. and Radzikowski, J., 2013. # Earthquake: Twitter as a distributed sensor system. Transactions in GIS, 17(1), pp.124-147.<br />
2. Houston, J. B., Hawthorne, J., Perreault, M. F., Park, E. H., Goldstein Hode, M., Halliwell, M. R., ... & Griffith, S. A. (2015). Social media and disasters: a functional framework for social media use in disaster planning, response, and research. Disasters, 39(1), 1-22.<br />
3. Liu, S. B., Palen, L., Sutton, J., Hughes, A. L., & Vieweg, S. (2008, May). In search of the bigger picture: The emergent role of on-line photo sharing in times of disaster. In Proceedings of the information systems for crisis response and management conference (ISCRAM) (pp. 4-7).<br />
4. Agyeman, J., & McLaren, D. (2017). Sharing cities. Environment: Science and Policy for Sustainable Development, 59(3), 22-27.<br />
5. Puiu, D., Barnaghi, P., Toenjes, R., Kümper, D., Ali, M. I., Mileo, A., ... & Gao, F. (2016). Citypulse: Large scale data analytics framework for smart cities. IEEE Access, 4, 1086-1108.<br />
6. Salathé, M., & Khandelwal, S. (2011). Assessing vaccination sentiments with online social media: implications for infectious disease dynamics and control. PLoS computational biology, 7(10).<br />
7. Kickbusch, I., & Leung, G. (2020). Response to the emerging novel coronavirus outbreak. BMJ 2020;368:m406<br />
8. World Health Organization. (2020). Risk communication and community engagement readiness and initial response for novel coronaviruses (nCoV): interim guidance v1 (No. WHO/2019-nCoV/RCCE/v2020. 1). World Health Organization.<br />
9. Chung, H., Iorga, M., Voas, J. and Lee, S., 2017. Alexa, can I trust you?. Computer, 50(9), pp.100-104.<br />
10. Lu, Y. and Da Xu, L., 2018. Internet of things (iot) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal, 6(2), pp.2103-2115.<br />
11. Sohal, A.S., Sandhu, R., Sood, S.K. and Chang, V., 2018. A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Computers & Security, 74, pp.340-354.<br />
12. Albladi, S.M. and Weir, G.R., 2018. User characteristics that influence judgment of social engineering attacks in social networks. Human-centric Computing and Information Sciences, 8(1), p.5.<br />
13. Keally, Matthew & Zhou, Gang & Xing, Guoliang & Nguyen, David & Qi, Xin. (2014). A Learning-Based Approach to Confident Event Detection in Heterogeneous Sensor Networks. ACM Transactions on Sensor Networks. 11. 1-28. 10.1145/2575788.<br />
14. Woosub Jung, Hongyang Zhao, Minglong Sun, Gang Zhou, “IoT botnet detection via power consumption modeling,” Elsevier Smart Health, Volume 15, 2020.<br />
15. Keally, Matthew & Zhou, Gang & Xing, Guoliang & Wu, Jianxin & Pyles, Andrew. (2011). PBN: Towards practical activity recognition using smartphone-based body sensor networks. 246-259. 10.1145/2070942.2070968.<br />
16. Q. Yang, P. Gasti, G. Zhou, A. Farajidavar and K. S. Balagani, “On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel,” in IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1056-1066, May 2017, doi: 10.1109/TIFS.2016.2639446.<br />
17. Peng, Ge & Zhou, Gang & Nguyen, David & Qi, Xin & Yang, Qing & Wang, Shuangquan. (2016). Continuous Authentication With Touch Behavioral Biometrics and Voice on Wearable Glasses. IEEE Transactions on Human-Machine Systems. PP. 1-13. 10.1109/THMS.2016.2623562.<br />
18. Keally, M. & Zhou, Gang & Xing, Guoliang & Wu, Jianxin. (2013). Remora: Sensing resource sharing among smartphone-based body sensor networks. 1-10. 10.1109/IWQoS.2013.6550261.<br />
19. Raleigh C, Linke A, Hegre H, Karlsen J. Introducing ACLED: An Armed Conflict Location and Event Dataset: Special Data Feature. J Peace Res. 2010;47: 651–660.<br />
20. Boschee E, Lautenschlager J, O’Brien S, Shellman S, Starz J, Ward M. ICEWS Coded Event Data. Harvard Dataverse; 2018. doi:10.7910/DVN/28075<br />
21. Leetaru K, Schrodt PA. Gdelt: Global data on events, location, and tone, 1979–2012. ISA Annual Convention. 2013;2.<br />
22. Zhao J, Runfola DM, Kemper P. Simulation study in quantifying heterogeneous causal effects. Institute of Electrical and Electronics Engineers Inc.; 2017. pp. 2650–2661.<br />
23. Guber R. Instrument Validity Tests with Causal Trees: With an Application to the Same-sex Instrument. 2018. doi:10.2139/ssrn.3251210<br />
24. Athey S, Imbens G. Recursive partitioning for heterogeneous causal effects. Proc Natl Acad Sci U S A. 2016;113: 7353–7360.<br />
</body>
</html>