default search action
10. SpaCCS Workshops 2017: Guangzhou, China
- Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings. Lecture Notes in Computer Science 10658, Springer 2017, ISBN 978-3-319-72394-5
The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017)
- Lei Li, Xiaoyong Li, Yali Gao:
MTIV: A Trustworthiness Determination Approach for Threat Intelligence. 5-14 - Xiaoli Hu, Chao Li, Huibing Zhang, Hongbo Zhang, Ya Zhou:
Distributed Caching Based Memory Optimizing Technology for Stream Data of IoV. 15-24 - Zhaojie Xu, Xiaoyong Li:
Secure Transfer Protocol Between App and Device of Internet of Things. 25-34 - Xiaoyan Li, Xiaoyong Li:
Rogue Access Points Detection Based on Theory of Semi-Supervised Learning. 35-44 - Jiahua Zhang, Xiaoyong Li:
Phishing Detection Method Based on Borderline-Smote Deep Belief Network. 45-53 - Ziwen Liu, Liang Fang, Lihua Yin, Yunchuan Guo, Fenghua Li:
Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field. 54-63 - Ya'nan Tian, Wen'an Zhou, Wenlong Liu:
Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network. 64-73 - Daxiu Zhang, Xiaojuan Zhu, Lu Wang:
A SYN Flood Detection Method Based on Self - similarity in Network Traffic. 74-82 - Leonard Kok, Sook-Ling Chua, Chin-Kuan Ho, Lee Kien Foo, Mohd Rizal Bin Mohd Ramly:
Annotating Network Service Fault Based on Temporal Interval Relations. 83-92
The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017)
- Jie Yu, Mangui Liang:
An Anonymous Identity-Based Authentication Scheme in Vector Network. 97-104
The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017)
- Chunlin Jiang, Shi-lan Wu, Ke Gu:
Two Improved Anonymous Authentication Methods for PCS. 109-118 - Heng Xiao, Xianchun Zhou:
Multi-match Segments Similarity Join Algorithm Based on MapReduce. 119-127 - Hai Jiang, Xianyi Zhu, Yi Xiao, Jiawei Luo, Yan Zheng:
GPU-Accelerated Histogram Generation on Smart-Phone and Webbrowser. 128-136 - Junhai Zhou, Qin Liu, Siwang Zhou, Yapin Lin:
An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks. 137-146 - Fei Peng, Zhen-Jie Yan, Min Long:
A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping. 147-158 - Yaoqiang Xiao, Zhiyi Wang, Jun Cao, Jin Yuan:
Image Encryption Based on Multi-scrolls Chaotic System and Logistic Map. 159-167 - Christian Callegari, Michele Pagano:
A Novel Bivariate Entropy-Based Network Anomaly Detection System. 168-179 - Ryan K. L. Ko, Thye Way Phua:
The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance. 180-193 - Kai Ma, Rong Jiang, Mianxiong Dong, Yan Jia, Aiping Li:
Neural Network Based Web Log Analysis for Web Intrusion Detection. 194-204
The 7th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2017)
- Kuzman Katkalov, Kurt Stenzel, Wolfgang Reif:
Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach. 209-218 - Manabu Hirano, Takuma Tsuzuki, Seishiro Ikeda, Naoga Taka, Kenji Fujiwara, Ryotaro Kobayashi:
WaybackVisor: Hypervisor-Based Scalable Live Forensic Architecture for Timeline Analysis. 219-230 - Isaac Odun-Ayo, Nicholas A. Omoregbe, Modupe Odusami, Olasupo Ajayi:
Cloud Ownership and Reliability - Issues and Developments. 231-240 - Wenjuan Li, Jian Cao, Jiyi Wu, Keyong Hu:
A Trust-Based Service Self-organizing Model for Cloud Market. 241-250 - Daoqiang Xu, Yefei Li, Ming Yin, Xin Li, Hao Li, Zhuzhong Qian:
A Reliable Resource Scheduling for Network Function Virtualization. 251-260 - Daoqiang Xu, Yefei Li, Songyun Wang, Xin Li, Zhuzhong Qian:
On Global Resource Allocation in Clusters for Data Analytics. 261-270 - Tao Sun, Linjing Zhang, Huiping Ma:
An Automatic Generation Method for Condition Expressions of CPN Model Focus on Tested Behaviors. 271-285
The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017)
- He Xu, Daniele Sgandurra, Keith Mayes, Peng Li, Ruchuan Wang:
Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks. 291-301 - Kuan-Lin Chen, Fuchun Joseph Lin:
Ensuring IoT/M2M System Security Under the Limitation of Constrained Gateways. 302-311 - Armin Babaei, Gregor Schiele:
Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things. 312-321 - Jing Yang Koh, Pengfei Zhang:
Localizing Wireless Jamming Attacks with Minimal Network Resources. 322-334
The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017)
- Jinfu Chen, Lin Zhang, Hilary Ackah-Arthur, Michael Omari, Jiaxiang Xi:
An Architecture of Urban Regional Health Information System and Its Data Conversion Algorithm. 339-349 - Hongjia Wu, Nao Wang, Gaocai Wang:
CCN Hotspot Cache Placement Strategy Based on Genetic Algorithm. 350-360 - Martin Appiah, Rita Cudjoe:
The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET). 361-368 - Jian Kang, Xiaojun Hei, Jianjian Song:
A Comparative Study of Zynq-Based OpenFlow Switches in a Software/Hardware Co-design. 369-378 - Watipatsa W. Nsunza, Samuel Rutunda, Xiaojun Hei:
Design and Implementation of a Low-Cost Software Defined Wireless Network Testbed for Smart Home. 379-388 - Wenfei Han, Gaocai Wang, Peng Ying:
Energy-Efficiency Aware Cooperative Caching Strategy for Content-Centric Networks. 389-398
The 3rd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017)
- Xu Bai, Lei Jiang, Jiajia Yang, Qiong Dai, Md. Zakirul Alam Bhuiyan:
Password Recovery for ZIP Files Based on ARM-FPGA Cluster. 405-414 - Fanpeng Meng, Yijun Gu, Shunshun Fu, Mengdi Wang, Yuchen Guo:
Comparison of Different Centrality Measures to Find Influential Nodes in Complex Networks. 415-423 - Jiajia Yang, Lei Jiang, Xu Bai, Qiong Dai, Majing Su, Md. Zakirul Alam Bhuiyan:
An FPGA-Based Algorithm to Accelerate Regular Expression Matching. 424-434 - Jiachang Hao, Kun Niu, Zichao Meng, Shuo Huang, Bing Ma:
A Collaborative Filtering Recommendation Algorithm Based on Score Classification. 435-445 - Chen Li, Jianxin Li, Jinghui Si, Yangyang Zhang:
FluteDB: An Efficient and Dependable Time-Series Database Storage Engine. 446-456 - S. Milton Ganesh, Pandi Vijayakumar, L. Jegatha Deborah, Md. Zakirul Alam Bhuiyan:
Attacks on the Anti-collusion Data Sharing Scheme for Dynamic Groups in the Cloud. 457-467 - Yuzhu Liang, Tian Wang, Md. Zakirul Alam Bhuiyan, Anfeng Liu:
Research on Coupling Reliability Problem in Sensor-Cloud System. 468-478 - Zhenyue Long, Jijun Zeng, Hong Zou, Yunkui Song:
An On-demand Monitoring Approach for Cloud Computing Systems. 479-488 - Niranchana Radhakrishnan, Marimuthu Karuppiah, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan:
Security on "A Lightweight Authentication Scheme with User Untraceability". 489-496 - Rongxin Bao, Xu Yuan, Zhikui Chen, Yujie Zhang:
A Security Scheme of Big Data Identity for Cloud Environment. 497-506 - Junqi Zhang, Qingfeng Cheng, Fushan Wei, Xinglong Zhang:
A Compact Construction for Non-monotonic Online/Offline CP-ABE Scheme. 507-523 - Haoyue Wang, Yangyang Zhang, Jianxin Li, Richong Zhang, Md. Zakirul Alam Bhuiyan:
RPS-TSM: A Robot Perception System Based on Temporal Semantic Map. 524-533 - Abdullah Al Omar, Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data. 534-543 - Qusay Medhat Salih, Md. Arafatur Rahman, Md. Zakirul Alam Bhuiyan, Zafril Rizal M. Azmi:
The Art of Using Cross-Layer Design in Cognitive Radio Networks. 544-556 - Jin Wu, Zhiqiang Zhu, Songhui Guo:
A Quality Model for Evaluating Encryption-as-a-Service. 557-569 - Shangde Gao, Xin Liao, Sujin Guo, Xiong Li, Pandi Vijayakumar:
Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement. 570-580 - Jeffrey Haynes, Maribette Ramirez, Thaier Hayajneh, Md. Zakirul Alam Bhuiyan:
A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration. 581-592 - Marc Capellupo, Jimmy Liranzo, Md. Zakirul Alam Bhuiyan, Thaier Hayajneh, Guojun Wang:
Security and Attack Vector Analysis of IoT Devices. 593-606 - Md. Alam Hossain, Md. Nazmul Hossain, Afridi Shahid, Shawon S. M. Rahman:
Security Solution of RFID Card Through Cryptography. 607-616 - Rajendran Karthika, Lazarus Jegatha Deborah, Pandi Vijayakumar, Sivaraman Audithan:
Grouping Users for Quick Recommendations of Text Documents Based on Deep Neural Network. 617-626 - Lian Duan, Fang Qi, Guojun Wang, Zhe Tang:
Module-Level Software Streaming Loading Model Based on Hypervisor. 627-636
The 3rd International Symposium on Sensor-Cloud Systems (SCS 2017)
- Walaa Alajali, Sheng Wen, Wanlei Zhou:
On-Street Car Parking Prediction in Smart City: A Multi-source Data Analysis in Sensor-Cloud Environment. 641-652 - Xiaoyan Kui, Shigeng Zhang, Wei Li, Ping Zhong, Xingpo Ma, Huakun Du:
A Weight-Bind-Based Safe Top-k Query Processing Scheme in Two-Tiered Sensor Networks. 653-666 - Jinyu Wang, Weiguo Wu, Zhaonan Qin, Dongfang Zhao:
A Floorplanning Algorithm for Partially Reconfigurable FPGA in Wireless Sensor Network. 667-679 - Hao He, Weidong Yi, Ming Li, Xiawei Jiang:
CO-TDMA: A TDMA Protocol for Collecting Data and OAP at the Same Time. 680-691 - Yongxuan Lai, Lv Zheng, Tian Wang, Fang Yang, Qifeng Zhou:
Cloud-Assisted Data Storage and Query Processing at Vehicular Ad-Hoc Sensor Networks. 692-702 - Haitao Yu, Qingwen Wang, Nianmin Yao, Yan Chu, Maojie Zhou, Yingrui Ma:
EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNs. 703-713
The 2nd International Workshop on Cloud Storage Service and Computing (WCSSC 2017)
- Yuxuan Xing, Nong Xiao, Yutong Lu, Ronghua Li, Songping Yu, Siqi Gao:
Fast Truss Decomposition in Memory. 719-729 - Songping Yu, Mingzhu Deng, Yuxuan Xing, Nong Xiao, Fang Liu, Wei Chen:
Pyramid: Revisiting Memory Extension with Remote Accessible Non-Volatile Main Memory. 730-743 - Xiehua Li, Ziyu Huang:
Fully Decentralized Multi-Authority ABE Scheme in Data Sharing System. 744-756 - Zejun Niu, Zheng Qin, Jixin Zhang, Hui Yin:
Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix. 757-766 - Yuxuan Xing, Siqi Gao, Nong Xiao, Fang Liu, Wei Chen:
Research on Graph Processing Systems on a Single Machine. 767-775 - Huabo Sun, Yang Jiao, Chun Wang, Jingru Han:
3D Model Reconstruction with Sequence Image of Aircraft. 776-782 - Shulan Yu, Yongzheng Tang, Chunfeng Wang:
Construction Research on Information Platform for Small and Medium-Sized Enterprises Based on Cloud Storage Technology. 783-790 - Jin Zhang, Yuxuan Li, Chengjun Sun, Haoxiang Yang, Jiacheng Wu, Xiaoli Gong:
XoT: A Flexible Block I/O Data Transfer Protocol for Xen. 791-800
The First International Symposium on Multimedia Security and Digital Forensics (MSDF 2017)
- Divya S. Vidyadharan, Sabu M. Thampi:
Detecting Spliced Face Using Texture Analysis. 805-813 - Manju S. Nair, M. S. Rajasree, Sabu M. Thampi:
Fine-Grained, Multi-key Search Control in Multi-user Searchable Encryption. 814-825 - Adedayo M. Balogun, Tranos Zuva:
Overview of Performance Evaluation of Keyword Search Utilities in Forensic/E-Discovery Software. 826-836
The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity (SPBD 2017)
- Xiaoyu Li, Shufang Li, Wenqi Li, Shiming Tian, Mingming Pan:
Distribution Network Topology Reconstruction Method Based on Lasso and Its Supplementary Criterions. 839-851
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.