default search action
11th SpaCCS 2018: Melbourne, NSW, Australia
- Guojun Wang, Jinjun Chen, Laurence T. Yang:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings. Lecture Notes in Computer Science 11342, Springer 2018, ISBN 978-3-030-05344-4
The 11th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2018)
- Huiyong Li, Jiannan Yu, Qian Cao:
Protecting Your Smartphone from Theft Using Accelerometer. 3-14 - Savio Sciancalepore, Roberto Di Pietro:
SOS - Securing Open Skies. 15-32 - Michael Sonntag:
DNS Traffic of a Tor Exit Node - An Analysis. 33-45 - Muhammad Arif, Guojun Wang, Tian Wang, Tao Peng:
SDN-Based Secure VANETs Communication with Fog Computing. 46-59 - Sarah McNary, Aaron Hunter:
Wearable Device Data for Criminal Investigation. 60-71 - Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu:
Authentication of Skyline Query over Road Networks. 72-83 - Syed Qasim Afser Rizvi, Guojun Wang, Jianer Chen:
A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing. 84-97 - Yasir Nawaz, Lei Wang, Kamel Ammour:
Processing Analysis of Confidential Modes of Operation. 98-110
The 4th International Symposium on Sensor-Cloud Systems (SCS 2018)
- Xingsi Xue, Shijian Liu:
Matching Sensor Ontologies Through Compact Evolutionary Tabu Search Algorithm. 115-124 - Yunji Li, Li Peng, Xuefang Zhu, Wen Li:
Event-Triggered Fault-Detection Filter Using Coordinate Transformation Approach for Time-Varying Stochastic Systems. 125-135 - Zhuoshi Yang, Yanxiang Wang, Lejun Zhang, Yiran Shen:
Indoor Interference Classification Based on WiFi Channel State Information. 136-145 - Ahmed Raad Al-Sudani, Shang Gao, Sheng Wen, Muhmmad Al-Khiza'ay:
Secure and Privacy Preserving RFID Based Access Control to Smart Buildings. 146-155 - Mohan Li, Yu Jiang, Yanbin Sun, Zhihong Tian:
Answering the Min-Cost Quality-Aware Query on Multi-sources in Sensor-Cloud Systems. 156-165 - Kai Peng, Lixin Zheng, Xiaolong Xu, Tao Lin, Victor C. M. Leung:
Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment. 166-177 - Jingbo Xia, Jian Shen, Yaoxiang Wu:
A Four-Stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Coverage. 178-191 - Chaogang Tang, Xianglin Wei, Jin Liu:
Application of Sensor-Cloud Systems: Smart Traffic Control. 192-202 - Wei Song, Min Li, Shun You:
Strategy-Proof Mechanism for Provisioning Non-obedient Resources Without Payment. 203-213
The 4th International Symposium on Dependability in Sensor, Cloud and Big Data Systems and Applications (DependSys 2018)
- Abdullah Ali Salamai, Morteza Saberi, Md. Omar Khadeer Hussain, Elizabeth Chang:
Risk Identification-Based Association Rule Mining for Supply Chain Big Data. 219-228 - Xuan Zhao, Md. Zakirul Alam Bhuiyan, Lianyong Qi, Hongli Nie, Wajid Rafique, Wanchun Dou:
TrCMP: An App Usage Inference Method for Mobile Service Enhancement. 229-239 - Shuo Zhang, Ningjiang Chen, Hanlin Zhang, Yijun Xue, Ruwei Huang:
A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replication. 240-250 - Musaddiq Majid Khan Al-Nadwi, Nadia Refat, Nafees Zaman, Md. Arafatur Rahman, Md. Zakirul Alam Bhuiyan, Ramdan Bin Razali:
Cloud Enabled e-Glossary System: A Smart Campus Perspective. 251-260 - Rongyu He, Haonan Sun, Yong Zhang:
A Dynamic Integrity Transitivity Model for the Cloud. 261-271 - Hira Zahid, Tariq Mahmood, Nassar Ikram:
Enhancing Dependability in Big Data Analytics Enterprise Pipelines. 272-281 - Wang Wei, Md. Arafatur Rahman, Md Jahan Ali, Md. Zakirul Alam Bhuiyan, Liu Yao, Hai Tao:
Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective. 282-293 - Maisha Afrida Tasnim, Abdullah Al Omar, Mohammad Shahriar Rahman, Md. Zakirul Alam Bhuiyan:
CRAB: Blockchain Based Criminal Record Management System. 294-303 - Usman Ahmad, Hong Song, Awais Bilal, Mamoun Alazab, Alireza Jolfaei:
Secure Passive Keyless Entry and Start System Using Machine Learning. 304-313
The 10th International Symposium on UbiSafe Computing (UbiSafe 2018)
- Itishree Mohallick, Katrien De Moor, Özlem Özgöbek, Jon Atle Gulla:
Towards New Privacy Regulations in Europe: Users' Privacy Perception in Recommender Systems. 319-330 - Shangfo Huang, Weifeng Lv, Zhipu Xie, Bo Huang, Bowen Du:
SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing. 331-340 - Bo Huang, Guixi Xiong, Zhipu Xie, Shangfo Huang, Bowen Du:
NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion. 341-350 - Jingyue Yang, Haiquan Wang, Zhaoyi Wang, Jieyi Long, Bowen Du:
BDCP: A Framework for Big Data Copyright Protection Based on Digital Watermarking. 351-360 - Yang Xu, Quanrun Zeng, Guojun Wang, Cheng Zhang, Ju Ren, Yaoxue Zhang:
A Privacy-Preserving Attribute-Based Access Control Scheme. 361-370 - Ahmed Raad Al-Sudani, Shang Gao, Sheng Wen, Muhmmad Al-Khiza'ay:
Checking an Authentication of Person Depends on RFID with Thermal Image. 371-380 - Kasra Majbouri Yazdi, Adel Majbouri Yazdi, Saeid Khodayi, Jingyu Hou, Wanlei Zhou, Saeed Saedy:
Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks. 381-391 - Zuojie Deng, Shuhong Chen, Xiaolan Tan, Dan Song, Fan Wu:
An Efficient Provable Multi-copy Data Possession Scheme with Data Dynamics. 392-402
The 7th International Symposium on Security and Privacy on Internet of Things (SPIoT 2018)
- Jialuo Han, Jidong Wang:
An Enhanced Key Management Scheme for LoRaWAN. 407-416 - Pascal Oser, Frank Kargl, Stefan Lüders:
Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics. 417-427 - Shafiq-Ur Rehman, Volker Gruhn, Saad Shafiq, Irum Inayat:
A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems. 428-442 - Nikos Fotiou, Vasilios A. Siris, George C. Polyzos:
Interacting with the Internet of Things Using Smart Contracts and Blockchain Technologies. 443-452
The 9th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2018)
- Senlin Wang, Junhai Zhou, Qin Liu, Zheng Qin, Panlin Hou:
Research on Multi-focus Image Fusion Algorithm Based on Quadtree. 457-464 - Xiaoping Ren, Fang Nan, Jian Wang:
Uncertainty Evaluation for Big Data of Mass Standards in a Key Comparison. 465-471 - Heng Xiao, Xianchun Zhou, Yue Tian:
Research on Wireless Spectrum Sensing Technology Based on Machine Learning. 472-479
The 10th International Workshop on Security in e-Science and e-Research (ISSR 2018)
- Jie Tao, Shaobo Zhang, Dalian Yang:
The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning. 485-496 - Xiaodan Yan, Baojiang Cui, Jianbin Li:
Malicious Domain Name Recognition Based on Deep Neural Networks. 497-505
The 8th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2018)
- Md. Zakirul Alam Bhuiyan, Md. Monirul Islam, Guojun Wang, Tian Wang:
Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals. 511-521 - Liang Liu, Zhe Xu, Yi-Ting Wang, Xiaolin Qin:
E ^2 STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks. 522-531
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.