Research and analysis of semantic search technology based on knowledge graph

Y Li - 2017 IEEE International Conference on Computational …, 2017 - ieeexplore.ieee.org
With the continuous development of society and the improvement of Internet technology,
people are getting more and more dissatisfied with the current exploration of unknown …

Cross-domain identity and discovery framework for web calling services

IT Javed, R Copeland, N Crespi, M Emmelmann… - Annals of …, 2017 - Springer
Cross-domain identity management remains a major challenge for potential WebRTC
adopters. In order to provide a global web-based communication system, it is critical to …

TrustCall: A trust computation model for Web conversational services

IT Javed, K Toumi, N Crespi - IEEE Access, 2017 - ieeexplore.ieee.org
Web conversational services are exposed to several threats in which the social context
between communicating participants is manipulated. Cybercrimes based on identity …

Cross-domain discovery of communication peers: Identity Mapping and Discovery Services (IMaDS)

I Friese, R Copeland, S Göndör… - … on Networks and …, 2017 - ieeexplore.ieee.org
The upcoming WebRTC-based browser-to-browser communication services present new
challenges for user discovery in peer-to-peer mode. Even more so, if we wish to enable …

Technology assessment for mission-critical services on automotive virtual edge communicator (AVEC)

R Copeland, S Ahvar, N Crespi… - … 21st Conference on …, 2018 - ieeexplore.ieee.org
Mission critical services are beginning to migrate to broadband from the trusted-but-limited
existing systems. They need assured availability and confidentiality for communication in …

Independently verifiable identity scheme (IVIS)

R Copeland, M Copeland - 2017 20th Conference on …, 2017 - ieeexplore.ieee.org
Web identity schemes suffer from weak authentication and low trust, while company-granted
identities are trusted but inflexible. Users either have trusted identities which they cannot …

ProtectCall: Call Protection based on User Reputation

IT Javed, K Toumi, N Crespi - 2017 IEEE Trustcom/BigDataSE …, 2017 - ieeexplore.ieee.org
Web calling services are exposed to numerous social security threats in which context of
communication is manipulated. A attacker establishes a communication session to send …