default search action
2nd CSCloud 2015: New York, NY, USA
- IEEE 2nd International Conference on Cyber Security and Cloud Computing, CSCloud 2015, New York, NY, USA, November 3-5, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-9300-3
- Keke Gai, Zhihua Du, Meikang Qiu, Hui Zhao:
Efficiency-Aware Workload Optimizations of Heterogeneous Cloud Computing for Capacity Planning in Financial Industry. 1-6 - Deepak K. Tosh, Shamik Sengupta, Sankar Mukhopadhyay, Charles A. Kamhoua, Kevin A. Kwiat:
Game Theoretic Modeling to Enforce Security Information Sharing among Firms. 7-12 - Ayesha M. Talha, Ibrahim Kamel, Zaher Al Aghbari:
Enhancing Confidentiality and Privacy of Outsourced Spatial Data. 13-18 - Longbin Chen, Yucong Duan, Meikang Qiu, Jian Xiong, Keke Gai:
Adaptive Resource Allocation Optimization in Heterogeneous Mobile Cloud Systems. 19-24 - Travis Brummett, Pezhman Sheinidashtegol, Debadrita Sarkar, Michael Galloway:
Performance Metrics of Local Cloud Computing Architectures. 25-30 - Syed Rizvi, Abdul Razaque, Katie Cover:
Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud Environment. 31-36 - Yong Jin, Hikaru Ichise, Katsuyoshi Iida:
Design of Detecting Botnet Communication by Monitoring Direct Outbound DNS Queries. 37-41 - Md Liakat Ali, Kutub Thakur, John V. Monaco, Meikang Qiu:
An Approach to Minimize Crossings in Phylogenetic Trees. 42-47 - Kurt Rohloff:
Privacy-Preserving Data Exfiltration Monitoring Using Homomorphic Encryption. 48-53 - Taimur Al Said, Omer F. Rana:
Implementing Migration-Aware Virtual Machines. 54-61 - Pandi Vijayakumar, Maria Azees, L. Jegatha Deborah:
CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks. 62-67 - Haruhisa Kosuge, Hidema Tanaka, Keisuke Iwai, Takakazu Kurokawa:
Integral Attack on Reduced-Round Rectangle. 68-73 - Keke Gai, Meikang Qiu, Hui Zhao, Wenyun Dai:
Anti-Counterfeit Scheme Using Monte Carlo Simulation for E-commerce in Cloud Systems. 74-79 - Salam Ismaeel, Ali Miri:
Using ELM Techniques to Predict Data Centre VM Requests. 80-86 - Jia Yang, Cai Fu, Deliang Xu, Lansheng Han, Xiao-Yang Liu:
Search Engine: A Hidden Power for Virus Propagation in Community Networks. 87-92 - Fanbiao Bao, Baoshan Huang, Bing Li, Yonghe Jiao:
The Software Design of Car Low-Speed Intelligent Braking System. 93-97 - Keke Gai, Meikang Qiu, Saravanan Jayaraman, Lixin Tao:
Ontology-Based Knowledge Representation for Secure Self-Diagnosis in Patient-Centered Teleheath with Cloud Systems. 98-103 - Mohd Anwar, Ashiq Imran:
Access Control for Multi-tenancy in Cloud-Based Health Information Systems. 104-110 - Kai Fan, Nana Huang, Yue Wang, Hui Li, Yintang Yang:
Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption. 111-114 - Yuanming Zhang, Kuan Ni, Jiawei Lu, Jun Xu, Gang Xiao:
DOGCP: A Domain-Oriented Government Cloud Platform Based on PaaS. 115-120 - Longbin Chen, Meikang Qiu, Jian Xiong:
An SDN-Based Fabric for Flexible Data-Center Networks. 121-126 - Mengmeng Wang, Jianwei Liu, Jie Chen, Xiao Liu, Jian Mao:
PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking. 127-132 - Fei Gu, Jianwei Niu, Zhenxue He, Meikang Qiu, Cuijiao Fu:
CLMRS: Designing Cross-LAN Media Resources Sharing Based on DLNA. 133-140 - Ihab Darwish, Obinna Igbe, Orhan Celebi, Tarek N. Saadawi, Joseph Soryal:
Smart Grid DNP3 Vulnerability Analysis and Experimentation. 141-147 - Hongmu Han, Ruixuan Li, Jinwei Hu, Meikang Qiu:
Context Awareness through Reasoning on Private Analysis for Android Application. 148-156 - Andrea Andreoli, Luca Ferretti, Mirco Marchetti, Michele Colajanni:
Enforcing Correct Behavior without Trust in Cloud Key-Value Databases. 157-164 - Dan Fleck, Fengwei Zhang, Sharath Hiremagalore, Stephen Reese, Liam McGhee:
Class-Chord: Efficient Messages to Classes of Nodes in Chord. 165-174 - Hui Zhao, Meikang Qiu, Keke Gai, Jie Li, Xin He:
Maintainable Mobile Model Using Pre-Cache Technology for High Performance Android System. 175-180 - Ahmet Ilhan Aysan, Sevil Sen:
"Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications. 181-186 - Haibin Zheng, Jing Qin, Jiankun Hu, Qianhong Wu:
Threshold Attribute-Based Signcryption in Standard Model. 187-193 - Guangquan Xu, Bin Liu, Yuanyuan Ren, Runhe Huang, Gaoxu Zhang, Zhiyong Feng, Xiaohong Li:
Towards Trustworthy Participants in Social Participatory Networks. 194-199 - Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong:
Detection and Identification of Android Malware Based on Information Flow Monitoring. 200-203 - Jiaxu Zhao, Zhide Chen, YaLi Zeng:
Intelligent Traffic Light Model Based on Grey-Markov Model and Improved Ant Colony Optimization for Dynamic Route Guidance. 204-212 - Xiang Tao, Yongxin Zhu, Yishu Mao, Han Song, Mengyun Liu, Xinyi Liu, Weiguang Sheng, Weiwei Shi:
Designing ARINC653 Partition Constrained Scheduling for Secure Real Time Embedded Avionics. 213-217 - Xiao Liu, Meikang Qiu, Xiaodong Wang, Weiran Liu, Kaiquan Cai:
Energy Optimization of Air-Based Information Network with Guaranteed Security Protection. 218-223 - Nezer Jacob Zaidenberg, Eviatar Khen:
Detecting Kernel Vulnerabilities During the Development Phase. 224-230 - Yang Yang, Hui Xu, Yanan Liu, Zhongwei Li, Weishan Zhang, Xin Liu:
Feature Analysis of Important Nodes in Microblog. 231-236 - Xuefei Wang, Hengtai Ma, Ke Yang, Hongliang Liang:
An Uneven Distributed System for Dynamic Taint Analysis Framework. 237-240 - Hongliang Liang, Dongyang Wu, Jiuyun Xu, Hengtai Ma:
Survey on Privacy Protection of Android Devices. 241-246 - Emma Osborn, Andrew Simpson:
Small-Scale Cyber Security. 247-252 - Hoi Ting Poon, Ali Miri:
A Low Storage Phase Search Scheme Based on Bloom Filters for Encrypted Cloud Services. 253-259 - Yoshiaki Shiraishi, Masami Mohri, Hitoshi Miyazaki, Masakatu Morii:
A Three-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme for Line Topology. 260-265 - Osama M. Ben Omran, Brajendra Panda:
Efficiently Managing Encrypted Data in Cloud Databases. 266-271 - Hevel Jean-Baptiste, Meikang Qiu, Keke Gai, Lixin Tao:
Meta Meta-Analytics for Risk Forecast Using Big Data Meta-Regression in Financial Industry. 272-277 - Ari Butowsky, Keke Gai, Michael Coakley, Meikang Qiu, Charles C. Tappert:
City of White Plains Parking App: Case Study of a Smart City Web Application. 278-282 - Yu Huang, Xuanzheng Hu, Guangxian Lv, Renfan Yang:
A Simulation Modeling Method Based on Petri Net. 283-288 - Simin Zhang, Bo Li, Jianxin Li, Mingming Zhang, Yang Chen:
A Novel Anomaly Detection Approach for Mitigating Web-Based Attacks Against Clouds. 289-294 - Thu Yein Win, Huaglory Tianfield, Quentin Mair:
Detection of Malware and Kernel-Level Rootkits in Cloud Computing Environments. 295-300 - Hevel Jean-Baptiste, Lixin Tao, Meikang Qiu, Keke Gai:
Understanding Model Risk Management - Model Rationalization in Financial Industry. 301-306 - Kutub Thakur, Meikang Qiu, Keke Gai, Md Liakat Ali:
An Investigation on Cyber Security Threats and Security Models. 307-311 - Hevel Jean-Baptiste, Meikang Qiu, Keke Gai, Lixin Tao:
Model Risk Management Systems-Back-End, Middleware, Front-End and Analytics. 312-316 - Wenqing Zhang, Shijie Zhou, Jiaqing Luo, Hongrong Cheng, Yongjian Liao:
A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners. 317-322 - Baolei Cheng, Jianxi Fan, Dajin Wang, Jiwen Yang:
A Reliable Broadcasting Algorithm in Locally Twisted Cubes. 323-328 - Salam Ismaeel, Ali Miri, Alireza Sadeghian, Dharmendra Chourishi:
An Extreme Learning Machine (ELM) Predictor for Electric Arc Furnaces' v-i Characteristics. 329-334 - Michael Kiperberg, Amit Resh, Nezer Jacob Zaidenberg:
Remote Attestation of Software and Execution-Environment in Modern Machines. 335-341 - Philip J. Riesch, Xiaojiang Du, Haibin Ling, Michael J. Mayhew:
Face Recognition with Environment Tolerance on a Mobile Device. 342-348 - Waqas Haider, Jiankun Hu, Xinghuo Yu, Yi Xie:
Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems. 349-355 - Yang Yang, Natalija Vlajic, Uyen Trang Nguyen:
Next Generation of Impersonator Bots: Mimicking Human Browsing on Previously Unvisited Sites. 356-361 - William Augusto Rodrigues de Souza, Allan Tomlinson:
SMM-Based Hypervisor Integrity Measurement. 362-367 - Fei Xu, Sheng Han, Ying Wang, Jian Zhang, Yong Li:
QRToken: Unifying Authentication Framework to Protect User Online Identity. 368-373 - Bharat S. Rawal, Ramesh K. Karne, Quiang Duan:
Split-System: The New Frontier of Cloud Computing. 374-381 - Charles A. Kamhoua, Andrew P. Martin, Deepak K. Tosh, Kevin A. Kwiat, Chad Heitzenrater, Shamik Sengupta:
Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach. 382-389 - David Jaeger, Martin Ussath, Feng Cheng, Christoph Meinel:
Multi-step Attack Pattern Detection on Normalized Event Logs. 390-398 - Harsha Kumara Kalutarage, Chonho Lee, Siraj Ahmed Shaikh, Francis Bu-Sung Lee:
Towards an Early Warning System for Network Attacks Using Bayesian Inference. 399-404 - Jedidiah Yanez-Sierra, Arturo Diaz-Perez, Victor Sosa-Sosa, José Luis González:
Towards Secure and Dependable Cloud Storage Based on User-Defined Workflows. 405-410 - Rui Tao, Jianwei Liu, Hang Su, Yang Sun, Xiao Liu:
Combination in Advance Batch Multi-exponentiation on Elliptic Curve. 411-416 - Zhi Qiao, Shuwen Liang, Hai Jiang, Song Fu:
MR-Graph: A Customizable GPU MapReduce. 417-422 - Jeffrey Bickford, Paul Giura:
Safe Internet Browsing Using a Transparent Virtual Browser. 423-432 - Suqi Zhang, Yongfen Dong, Jun Yin, Jingjin Guo:
Improved Ant Colony Algorithm for Finding the Maximum Clique in Social Network. 433-438 - Haruhisa Kosuge, Hidema Tanaka, Keisuke Iwai, Takakazu Kurokawa:
Computational Security Evaluation of Light-Weight Block Cipher Against Integral Attack by GPGPU. 439-444 - Ibrahim Waziri:
Website Forgery: Understanding Phishing Attacks and Nontechnical Countermeasures. 445-450 - Thaier Hayajneh, Tao Zhang, Bassam Jamil Mohd:
Security Issues in WSNs with Cooperative Communication. 451-456 - Wenbo Zhu, C. Murray Woodside:
Tunable Performance and Consistency Tradeoffs for Geographically Replicated Cloud Services (COLOR). 457-463 - Wenjia Li, Jigang Ge, Guqian Dai:
Detecting Malware for Android Platform: An SVM-Based Approach. 464-469 - Salam Ismaeel, Ali Miri, Dharmendra Chourishi, S. M. Reza Dibaj:
Open Source Cloud Management Platforms: A Review. 470-475 - Ming Jiang, Ai He, Kuangyu Wang, Zhengyi Le:
Two-Way Graphic Password for Mobile User Authentication. 476-481 - Joseph Funsho Omonaiye, V. V. Madhavi Lalitha, Habib Ullah Khan, Sheila D. Fournier-Bonilla, Rajvir Singh:
Ability and Hurdle to Provide Banking Online Services: A Case Study of Banking Employees in Nigeria. 482-487 - S. Sree Vivek, Rajkumar Ramasamy:
Forward Secure On-device Encryption Scheme Withstanding Cold Boot Attack. 488-493 - Khagesh Patel, Ishaan Dube, Lixin Tao, Ning Jiang:
Extending OWL to Support Custom Relations. 494-499 - Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh:
Improved Differential Characteristic Searching Methods. 500-508 - Quentin Mayo, Renée C. Bryce, Ram Dantu:
PhD Forum: A System Identification Approach to Monitoring Network Traffic Security. 509-511 - Zaid Al-Ali, Basheer Al-Duwairi, Ahmad T. Al-Hammouri:
Handling System Overload Resulting from DDoS Attacks and Flash Crowd Events. 512 - Michel Edkrantz, Staffan Truvé, Alan Said:
Predicting Vulnerability Exploits in the Wild. 513-514 - Tianyu Chen, Yuan Ma, Jingqiang Lin, Zhan Wang, Jiwu Jing:
An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test. 515-517 - Lujin You, Junjie Peng, Ming Chen, Meikang Qiu:
A Strategy to Improve the Efficiency of I/O Intensive Application in Cloud Computing Environment. 518-523 - Jinbao Chen, Junjie Peng, Xiaofei Zhi, Meikang Qiu:
Research on Application Classification Method in Cloud Computing Environment. 524-529 - Huiqiang Wang, Shichen Zou, Junyu Lin, Guangsheng Feng, Hongwu Lv:
A Dependable Service Path Searching Method in Distributed Virtualized Environment Using Adaptive Bonus-Penalty Micro-Canonical Annealing. 530-539 - Zhouwang Fu, Tao Song, Sheng Wang, Fuzong Wang, Zhengwei Qi:
Seagull - A Real-Time Coflow Scheduling System. 540-545
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.