default search action
ISCTCS 2013: Beijing, China
- Yuyu Yuan, Xu Wu, Yueming Lu:
Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers. Communications in Computer and Information Science 426, Springer 2014, ISBN 978-3-662-43907-4 - Genxian Liu, Xi Zhang, Dongsheng Wang, Zhenyu Liu, Haixia Wang:
Security Memory System for Mobile Device or Computer Against Memory Attacks. 1-8 - Zhixiang Tong, Qiankun Zhuang, Qi Guo, Peijun Ma:
Research on Technologies of Software Requirements Prioritization. 9-21 - Yanjun Jiang, Mingshan Lei:
MD5 Calculation and Decryption Using CUDA on GPU. 22-28 - Guofeng Wang, Chuanyi Liu, Jie Lin:
Transparency and Semantics Coexist: When Malware Analysis Meets the Hardware Assisted Virtualization. 29-37 - Hu Li, Peng Zou, Weihong Han, Rongze Xia:
Imbalanced Chinese Text Classification Based on Weighted Sampling. 38-45 - Yunlong Ren, Yue Li, Fangfang Yuan, Fangjiao Zhang:
Hijacking Activity Technology Analysis and Research in Android System. 46-53 - Peng Wang, Chengwei Zhang, Xuanya Li, Can Zhang:
A Mobile Botnet Model Based on Android System. 54-61 - Pingping Liu, Zhihong Tian, Xu Wu, Wei Liu:
An Improved Common Vulnerability Scoring System Based on K-means. 62-69 - Gangfu Feng, Chen Zhang, Quan Zhang:
A Design of Linkage Security Defense System Based on Honeypot. 70-77 - Jiao Wang, Yulin Liu, Zhichao Chao, Wei He:
A Modified Single-Channel Blind Separation Method Using EMD and ICA. 78-85 - Shaopeng Wang, Yuan Zhang, Yan Peng:
Flexible Mechanism Research of Workflow System Based on SOA. 86-92 - Yaoyao Guo, Songlin Sun, Xiaojun Jing, Hai Huang, Yueming Lu, Na Chen:
Effective Rate Control Algorithm for H.264 Based on Scene Change Detection. 93-99 - Anqi Huang, Chen Zhang, Chaojing Tang:
Another Improvement of LMAP++: An RFID Authentication Protocol. 100-106 - Chen Chen, Qingyun Liu, Hongzhou Sha, Zhou Zhou, Chao Zheng:
A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy Caching. 107-114 - Wenhao Wang, Chen Zhang, Quan Zhang:
An Anomaly Detection Model Based on Cloud Model and Danger Theory. 115-122 - Lei Wang, Chenglong Li, Qingfeng Tan, Xuebin Wang:
Generation and Distribution of Decoy Document System. 123-129 - Ying Zhang, Yongzheng Zhang, Jun Xiao:
Detecting the DGA-Based Malicious Domain Names. 130-137 - Shaojie Pei, Lumin Zhang, Aiping Li, Yusha Liu:
Microblog Sentiment Classification Based on Supervised and Unsupervised Combination. 138-145 - Xiaohong Shi, Ying Ji, Hui Xie, Yueming Lu:
A Prefetching Mechanism Based on MooseFS. 146-153 - Ganggang Zhang, Min Zuo, Xinliang Liu, Fan Xia:
Improving the Efficiency of Storing SNS Small Files in HDFS. 154-160 - Di Wu, Xing Li, Yongmei Sun, Yuefeng Ji, Jie Mao, Yingting Liu:
A Highly Efficient Indoor Localization Scheme Based Only on Mobile Terminal. 161-168 - Xiaowei Xie, Yu Yang, Yueming Lu:
A Zones-Based Metadata Management Method for Distributed File System. 169-175 - Xiaohong Shi, Kun Guo, Yueming Lu, Xi Chen:
Survey on Data Recovery for Cloud Storage. 176-184 - Yue Li, Qingyang Gao, Jørgen Bøegh:
The Evaluation of Service Trustworthiness Based on BP-Neural Network. 185-190 - Shuaisen Wang, Jørgen Bøegh, Jincui Yang:
Research on Trustworthy Sensor Network Based on Zigbee Technology. 191-197 - Lilei Lu, Yanhong Shang, Yaping Ge, Jinli Qu:
Research of Digital Campus Construction Based on Cloud Computing. 198-204 - Tingting Wang, Jørgen Bøegh:
Multi-layer CAPTCHA Based on Chinese Character Deformation. 205-211 - Krishna Moniz, Yuyu Yuan:
Filtering Training Data When Training Feed-Forward Artificial Neural Network. 212-218 - Luping Chen, Yongzhen Guo, Feng Zhou:
Security Risk Assessment of Mobile Internet Under Cloud Computing Mode. 219-226 - Jizeng Guan, Xiaolu Zhu, Mingtao Lei, Jianyi Liu, Cong Wang:
Business Impact Analysis Model Based on the Analytic Hierarchy Process. 227-234 - Jørgen Bøegh:
Trust and Trustworthiness in Human Behavior and IT Services - Concepts, Definitions and Relations. 235-251 - You Meng, Lang Yu, Zhongzhi Luan, Depei Qian, Ming Xie, Zhigao Du:
A Black-Box Approach for Detecting the Failure Traces. 252-259 - Shaolin Qiu, Laibin Zhang, Yuanqiang Huang, Yaming Mao:
An Effective Resource Management Architecture in HSE System. 260-267 - Qi Zhao, Hailong Yang, Guang Wei, Zhongzhi Luan, Depei Qian:
Energy Efficiency Evaluation of Workload Execution on Intel Xeon Phi Coprocessor. 268-275 - Qian Liu, Qianwen He, Yu Zhang:
A Covert Channel Bases on CPU Load in Cloud Computing. 276-282 - Yu Zhang, Feiyan Li:
Adaptive Synchronization of Complex Networks with Time-Varying Delay Nodes and Delay Coupling. 283-289 - Shihong Zhou, Lin Yao:
Gigabit Ethernet Data Transfer Based on FPGA. 290-296 - Ningning Song, Zhen Mei, Lin Yao:
Research on Efficient Dynamic Cloud Storage Ciphertext Access Control. 297-303 - Ningning Song, Longqun Zou, Yunluo Liu:
Research on the Inverted Index Based on Compression and Perception. 304-310 - Kuo Zhang, Juanzi Li, Gang Wu:
Term Committee Based Event Identification and Dependency Discovery. 311-327 - Kuo Zhang, Juan-Zi Li, MingCai Hong, XueDong Yan, Qiang Song:
A Semantics Enabled Intelligent Semi-structured Document Processor. 328-344 - Yuanquan Fan, Wei Wei, Yan Gao, Weiguo Wu:
Introduction and Analysis of Simulators of MapReduce. 345-350 - Cong Yang, Weiguo Wu, Yuanqi Su:
Level Set Method Based Image Segmentation by Combining Local Information with Global Information. 351-361 - Enjie Liu, Xiaohua Feng:
Trustworthiness in the Patient Centred Health Care System. 362-365 - Manawa Anakpa, Yuyu Yuan:
Multidisciplinary Trust Conceptualization: A General Model for Customer Trust Building in e-Commerce. 366-373 - Miandrilala, Yuyu Yuan:
Concept of Service Trustworthiness Management System (STMS). 374-381 - Changning Song:
Android-Based Remote-Control with Real-Time Video Surveillance for Wi-Fi Robot. 382-388 - Chengli Mei, Min Zhang, Zhongang Qi, Qi Bi:
Characterizing and Comparing User Location Preference in an Urban Mobile Network. 389-396 - Axel Rennoch, Ina Schieferdecker, Jürgen Großmann:
Security Testing Approaches - For Research, Industry and Standardization. 397-406
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.