Filter
Chapter

Search results

  • 2022

    Classifying COVID-19 Variants Based on Genetic Sequences Using Deep Learning Models

    Basu, S. & Campbell, R. H., Jul 2022, System Dependability and Analytics: Approaching System Dependability from Data, System and Analytics Perspectives. Wang, L., Pattabiraman, K., Di Martino, C., Athreya, A. & Bagchi, S. (eds.). Springer, p. 347-360 14 p. (Springer Series in Reliability Engineering).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2019

    Cybersecurity Ethics

    Blanken-Webb, J., Palmer, I., Campbell, R., Burbules, N. C. & Bashir, M. N., 2019, Foundations of Information Ethics. Burgess, J. T. F. & Knox, E. J. M. (eds.). ALA Neal-Schuman

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2018

    Introduction

    Campbell, R. H., Dec 20 2018, Assured Cloud Computing. Campbell, R. H., Kamhoua, C. A. & Kwiat, K. A. (eds.). Wiley-IEEE Press, p. 1-9

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Scalability, Workloads, and Performance: Replication, Popularity, Modeling, and Geo-Distributed File Stores

    Campbell, R. H., Noghabi, S. A. & Abad, C. L., Dec 20 2018, Assured Cloud Computing. Campbell, R. H., Kamhoua, C. A. & Kwiat, K. A. (eds.). Wiley-IEEE Press, p. 133-159

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Summary and Future Work

    Campbell, R. H., Dec 20 2018, Assured Cloud Computing. Campbell, R. H., Kamhoua, C. A. & Kwiat, K. A. (eds.). Wiley-IEEE Press, p. 312-326

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2008

    Automated assessment of compliance with security best practices

    Anwar, Z. & Campbell, R., 2008, Critical Infrastructure Protection II. Papa, M. & Shenoi, S. (eds.). p. 173-187 15 p. (IFIP International Federation for Information Processing; vol. 290).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Detecting cyber attacks on nuclear power plants

    Rrushi, J. & Campbell, R., 2008, Critical Infrastructure Protection II. Papa, M. & Shenoi, S. (eds.). p. 41-54 14 p. (IFIP International Federation for Information Processing; vol. 290).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2004

    Middlewhere: A middleware for location awareness in ubiquitous computing applications

    Ranganathan, A., Al-Muhtadi, J., Chetan, S., Campbell, R. & Dennis Mickunas, M., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jacobsen, H.-A. (ed.). Springer, p. 397-416 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3231).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
  • 2003

    Definition of a user environment in a ubiquitous system

    Carvalho, D., Campbell, R., Belford, G. & Mickunas, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Meersman, R., Tari, Z. & Schmidt, D. C. (eds.). Springer, p. 1151-1169 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2888).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Towards security and privacy for pervasive computing

    Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G. & Mickunas, M. D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Okada, M., Pierce, B. C., Scedrov, A., Tokuda, H. & Yonezawa, A. (eds.). Springer, p. 1-15 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2609).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2000

    Secure smart homes using Jini and UIUC SESAME

    Al-Muhtadi, J., Anand, M., Mickunas, M. D. & Campbell, R., 2000, Proceedings - Annual Computer Security Applications Conference, ACSAC. p. 77-85 9 p. 898860

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 1993

    Distributed access to persistent objects

    Lim, S. B., Xiao, L. & Campbell, R., 1993, IFIP Transactions A: Computer Science and Technology. A-39 ed. Publ by Elsevier Science Publishers B.V., p. 329-340 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Uniform co-scheduling using object-oriented design techniques

    Islam, N. & Campbell, R., 1993, IFIP Transactions A: Computer Science and Technology. A-39 ed. Publ by Elsevier Science Publishers B.V., p. 317-328 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter