Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2022
ICSA: Intelligent chatbot security assistant using Text-CNN and multi-phase real-time defense against SNS phishing attacks
Expert Systems with Applications: An International Journal (EXWA), Volume 207, Issue Chttps://doi.org/10.1016/j.eswa.2022.117893Highlights- SNS phishing attack is one of social engineering attacks.
- Formalized SNS ...
SNS phishing attack is one of the representative social engineering attacks exploiting humans’ emotions and trust and thus usually proceeds in multi-phases such that the attacker first forms an intimate bond with victims emotionally ...
- articleJune 2015
A compact electromagnetic micro-actuator using the meander springs partially exposed to magnetic field
Microsystem Technologies (MITE), Volume 21, Issue 6Pages 1233–1239https://doi.org/10.1007/s00542-014-2164-1We present the design, fabrication, and testing of a compact electromagnetic micro-actuator using meander springs that are partially exposed to the magnetic field. The previous electromagnetic micro-actuators using cantilever springs require large ...
- ArticleOctober 2014
Enhancing Trust-Aware Routing by False Alarm Detection and Recovery
MILCOM '14: Proceedings of the 2014 IEEE Military Communications ConferencePages 52–59https://doi.org/10.1109/MILCOM.2014.18Insider packet drop attacks have become a serious threat to wireless sensor networks. To distinguish a packet dropped by inside attackers from network failures, each node will use a trust mechanism to evaluate its neighbor node's trustworthiness so it ...
- ArticleMay 2012
Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks
SPW '12: Proceedings of the 2012 IEEE Symposium on Security and Privacy WorkshopsPages 134–141https://doi.org/10.1109/SPW.2012.32Trust based approaches have been widely used to counter insider attacks in wireless sensor networks because traditional cryptography-based security mechanisms such as authentication and authorization are not effective against such attacks. A trust model,...
- articleMarch 2011
Adaptive product tracking in RFID-enabled large-scale supply chain
Expert Systems with Applications: An International Journal (EXWA), Volume 38, Issue 3Pages 1583–1590https://doi.org/10.1016/j.eswa.2010.07.077The Radio Frequency Identification (RFID) technology is gradually being adopted and deployed for product flow management in the supply chain. In order to track RFID-tagged products efficiently in the RFID-enabled, large-scale supply chain, this paper ...
- articleNovember 2010
Anti-buckling S-shaped vertical microprobes with branch springs
Microelectronic Engineering (MCEE), Volume 87, Issue 9Pages 1769–1776https://doi.org/10.1016/j.mee.2009.10.014We propose the S-shaped vertical probes with branch springs for the wafer-level testing of IC chips. The conventional S-shaped vertical probe requires a guide structure to prevent buckling due to the large overdrive actuation involved. However, the ...
- articleJuly 2009
Numerical study of particle focusing through improved Lab-on-a-Chip device by positive dielectrophoresis
Microsystem Technologies (MITE), Volume 15, Issue 7Pages 1059–1065In this paper an improved Lab-on-a-Chip device has been proposed for focusing the particle at the center of the channel to separate the desired particles from the main stream at the exit. The design methodology is kept simple and a two fluidic port ...
- ArticleOctober 2005
Ontology based negotiation case search system for the resolution of exceptions in collaborative production planning
OTM'05: Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet SystemsPages 24–25https://doi.org/10.1007/11575863_12In this paper, we present an ontology based negotiation case search system that supports contractors to solve exceptions generated during the operation of supply chain.
- doctoral_thesisJanuary 1992
Design, fabrication, and optimization of micromechanical flexures
In this dissertation are described two types of micromechanical flexures for guiding movable micromechanical structures with applications to high-precision Micro Electro Mechanical Systems (MEMS), whose typical sizes are in the order of 100 $\mu$m.
One ...