Root Cause Analysis Using Graph-Based Provenance Inferencing.
A Fault Tolerant False Data Injection Attacks Detection in Smart Grid Using Fragile Watermarking.
Towards detection of Rank Attack in Routing Protocol for Low Power Lossy Network.
Improving Operational Quality of Scientific Workflows using Ontology-based provenance Inferencing.
Inferring Operational Quality from Provenance Using Rule-Based Approach.
Towards a Multi-Agent-Based Approach for Geolocation Assurance in Cloud Computing.
Secure Logging as a Service using Fragile Watermarking.
A Zero Watermarking Scheme for Data Integrity Protection in Wireless Sensor Networks.
A Fingerprinting Based Approach for Illegal Copy Detection for Geolocation of Cloud Data.
MATE in the Cloud- Secure Data Deletion on Full Compromised of Cloud Based on Proof of Availability (POA).
Ensuring Privacy of Outsourced Genomic Data using Ontology-based SLA monitoring.
Attribute-based Access control (ABAC) for outsourced provenance graph.
A Model for Generating Unified Format Logs and Provenance Using RDF.
A Secure Provenance Scheme Using Provable Data Possession (PdP).
Secure provenance Storage Using Authenticated Data Structure.
Preserving Privacy of Outsourced Genomic Data.
Watermarking as a Service (WaaS) with Anonymity.
An Ontology-Based Approach for Detecting Attacks on Genomic Data.
Fault Tolerant Malicious URL Filtering.
Model Dewey Decimal Classification Scheme Using OWL Ontology for CIIT Library.
Ontology-based Framework for URL Filtering and Blocking.
A Noval Method to Log-as-a-Service on Cloud Using Reversible Watermarking.
A Scalable Data Integrity Mechanism Based on PdP and JARs.
URL Filtering using Big Data Architecture.
Towards Semantic Based Inferencing for Logs.
Agent-based Identification and Classification of ROP (Role, Object, and Permission) in Distributed Environment.
Ontology-based Multilingual URL Filtering.
Ontology-based Approach for Detecting System Errors Using Logs.
An Ontology-Based Approach for Detecting Drug Abuse Epidemiology.
An Ontology-based Approach for Detecting Attacks on Semantic Web.
Financial Fraud Detection: An Ontology-based approach
Semantic Blockchain for Providing Provenance for GDPR Compliance
Implications of Text Categorization in Organization of Ontologies
User-Centric Ontology Recommendation System
Ontology label Generation using text classification
A Classification Model of Factors Influencing CKM in GSD for Enhancing Software Quality: A Client and Vendor Perspective