Abstract is missing.
- Computing Large Connected Components Using Map Reduce in Logarithmic RoundsAmar Sharma, Rajiv Misra. 1-6 [doi]
- Differential Privacy of Big Data: An OverviewXiaoming Yao, Xiaoyi Zhou, Jixin Ma 0001. 7-12 [doi]
- Authentication and Access Control in e-Health Systems in the CloudNafiseh Kahani, Khalid Elgazzar, James R. Cordy. 13-23 [doi]
- Trust Issues for Big Data about High-Value Manufactured PartsAnku Adhikari, Avesta Hojjati, Juanli Shen, Jui-Ting Hsu, William P. King, Marianne Winslett. 24-29 [doi]
- Privacy Preserving Rack-Based Dynamic Workload Balancing for Hadoop MapReduceXiaofei Hou, Doyel Pal, Ashwin Kumar T. K, Johnson P. Thomas, Hong Liu 0022. 30-35 [doi]
- A Big Data Architecture for Security Data and Its Application to Phishing CharacterizationPedro Henrique B. Las-Casas, Vinícius Vitor dos Santos Dias, Wagner Meira Jr., Dorgival O. Guedes. 36-41 [doi]
- Assessing Vulnerabilities in Bluetooth Low Energy (BLE) Wireless Network Based IoT SystemsYanzhen Qu, Philip Chan. 42-48 [doi]
- AI^2: Training a Big Data Machine to DefendKalyan Veeramachaneni, Ignacio Arnaldo, Vamsi Korrapati, Constantinos Bassias, Ke Li. 49-54 [doi]
- A Scalable Meta-Model for Big Data Security AnalysesBaijian Yang, Tonglin Zhang. 55-60 [doi]
- OwlSight: Platform for Real-Time Detection and Visualization of Cyber ThreatsVasco Samuel Carvalho, Maria Joao Polidoro, João Paulo Magalhães. 61-66 [doi]
- Clouds for Hit-and-Run Wireless AttacksJ. Jenny Li, Fenando Neto, Jingchio Liou. 67-72 [doi]
- Secure Data Outsourcing with Adversarial Data Dependency ConstraintsBoxiang Dong, Wendy Hui Wang, Jie Yang 0003. 73-78 [doi]
- An Ultra Lightweight Encryption Design for Security in Pervasive ComputingGaurav Bansod, Abhijit Patil, Swapnil Sutar, Narayan Pisharoty. 79-84 [doi]
- A Secure Framework for Ensuring EHR's Integrity Using Fine-Grained Auditing and CP-ABEB. Eswara Reedy, Gandikota Ramu. 85-89 [doi]
- Reverse TCP and Social Engineering Attacks in the Era of Big DataChristine Atwell, Thomas Blasi, Thaier Hayajneh. 90-95 [doi]
- Towards Secure Tag-MapReduce Framework in CloudCherif A. A. Bissiriou, Mostapha Zbakh. 96-104 [doi]
- Arithmetic Correlation Used in Mobile Cloud ID-Based Multiple AuthenticationHuijuan Wang, Yong Jiang, Gao-Feng Zhan, Rui-Sheng Shi. 105-108 [doi]
- Securing Big Data Environments from AttacksUdaya Kiran Tupakula, Vijay Varadharajan. 109-112 [doi]
- Towards Performance Evaluation of Oblivious Data Processing Emulated with Partially Homomorphic Encryption SchemesVasily Sidorov, Wee Keong Ng. 113-115 [doi]
- Embedding Model-Based Security Policies in Software DevelopmentJavier Navarro-Machuca, Li-Chiou Chen. 116-122 [doi]
- A Novel Approach to Predictive Graphs Using Big DataSrinivasan Shanmugam, Harish Ragavan. 123-128 [doi]
- Improve the Prediction Accuracy of Naïve Bayes Classifier with Association Rule MiningTianda Yang, Kai Qian, Dan Chia-Tien Lo, Ying Xie, Yong Shi, Lixin Tao. 129-133 [doi]
- Aspects of Data Cataloguing for Enterprise Data PlatformsSrinivasan Shanmugam, Gokul Seshadri. 134-139 [doi]
- Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big DataKeke Gai, Meikang Qiu, Hui Zhao 0002. 140-145 [doi]
- Towards Efficient Authentication Scheme with Biometric Key Management in Cloud EnvironmentZaid Ameen Abduljabbar, Hai Jin 0001, Zaid Alaa Hussien, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou. 146-151 [doi]
- Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud ComputingMing-Quan Hong, Peng-Yu Wang 0003, Wen-Bo Zhao. 152-157 [doi]
- A Secure Management Scheme Designed in CloudPeng-Yu Wang 0003, Ming-Quan Hong. 158-162 [doi]
- Cooperative Monitoring Mechanism for Cluster Based on Message Routing QueueGuan Yang, Xiaolong Xu. 163-170 [doi]
- A Novel Secure Big Data Cyber Incident Analytics Framework for Cloud-Based Cybersecurity InsuranceKeke Gai, Meikang Qiu, Sam Adam Elnagdy. 171-176 [doi]
- Privacy in the Cloud: Anonymous Tax PreparationEmmanuel S. Peters, Nicholas F. Maxemchuk. 177-182 [doi]
- Impact of Cyber-Attacks on Critical InfrastructureKutub Thakur, Md Liakat Ali, Ning Jiang, Meikang Qiu. 183-186 [doi]
- Information Security Policy for E-Commerce in Saudi ArabiaKutub Thakur, Md Liakat Ali, Keke Gai, Meikang Qiu. 187-190 [doi]
- Quantitative Analysis of Graph Algorithms: Models and Optimization MethodsXu Wang 0010, Yongxin Zhu 0001, Yufeng Chen. 191-196 [doi]
- Security-Aware Information Classifications Using Supervised Learning for Cloud-Based Cyber Risk Management in Financial Big DataKeke Gai, Meikang Qiu, Sam Adam Elnagdy. 197-202 [doi]
- Parallelization of Error Weighted Hashing for Approximate k-Nearest Neighbour Search on GPU-CPU HybridSiddharth Bhatia 0001, Mohan Pavan Kumar Badarla. 203-207 [doi]
- Using Diversity to Harden Multithreaded Programs Against ExploitationDavid M. Tagatac, Michalis Polychronakis, Salvatore J. Stolfo. 208-213 [doi]
- Exploiting Redundant Computation in Communication-Avoiding Algorithms for Algorithm-Based Fault ToleranceCamille Coti. 214-219 [doi]
- Parallel Simulation of Full-Field Polymer FloodingKun Wang 0022, Hui Liu 0005, Jia Luo, Song Yu, Zhangxin Chen, Peng Zhang 0006. 220-225 [doi]
- Investigation of Reconfigurable FPGA Design for Processing Big Data StreamsUsamah Algemili. 226-233 [doi]
- LA-Credit: A Load-Awareness Scheduling Algorithm for Xen Virtualized PlatformsJun Wu, Chen-Yuan Wang, Jian-Fu Li. 234-239 [doi]
- An Energy Efficient VM Allocation Approach for Data CentersIksen Caglar, Deniz Turgay Altilar. 240-244 [doi]
- A Classification Algorithm Based on Ensemble Feature Selections for Imbalanced-Class DatasetHua Yin, Keke Gai, Zhijian Wang. 245-249 [doi]
- Performance of Partitioned Homogeneous Multiprocessor Real-Time Scheduling Algorithms in Heterogeneous EnvironmentsAndrew Burke. 250-255 [doi]
- Traffic Aware Virtual Machine Packing in Cloud Data CentersJun Liu, Jinhua Guo, Di Ma. 256-261 [doi]
- A New Replica Placement Policy for Hadoop Distributed File SystemWei Dai, Ibrahim Adel Ibrahim, Mostafa A. Bassiouni. 262-267 [doi]
- Energy Efficient Traffic-Aware Virtual Machine Migration in Green Cloud Data CentersVeena Reddy Reguri, Swetha Kogatam, Melody Moh. 268-273 [doi]
- Multiscale Modeling of Mechanotransduction Processes in Flow-Induced Platelet ActivationChao Gao, Peng Zhang 0006, Danny Bluestein. 274-279 [doi]
- GPU-Accelerated Preconditioned GMRES SolverBo Yang 0020, Hui Liu 0005, Zhangxin Chen, Xuhong Tian. 280-285 [doi]
- Coupled Geomechanics and Reservoir Flow Modeling on Distributed Memory Parallel ComputersJia Luo, Kun Wang 0022, Hui Liu 0005, Zhangxin Chen. 286-291 [doi]
- Large-Scale Reservoir Simulations on Parallel ComputersYan Chen, Hui Liu 0005, Kun Wang 0022, Zhangxin Chen, Yanfeng He, Bo Yang 0020, Peng Zhang 0006. 292-297 [doi]
- A Component Based Graphical Parallel Programming Approach for Numerical Simulation DevelopmentLi Liao, Zeyao Mo, Aiqing Zhang. 298-303 [doi]
- Algorithms in ParAFEMImp: A Parallel and Wideband Impedance Extraction Program for Complicated 3-D GeometriesTao Cui, Junqing Chen, Hengliang Zhu, Xuan Zeng 0001. 304-309 [doi]
- A Programming Framework for Large Scale Numerical Simulations on Unstructured MeshQingKai Liu, Weibo Zhao, Jie Cheng, Zeyao Mo, Aiqing Zhang, Jianjun Liu. 310-315 [doi]
- A Scalable, Parallel Module for Overlapping Grids and Its ApplicationsHong Guo, Aiqing Zhang, Zeyao Mo, Ye Pu. 316-321 [doi]
- Evaluation Model of the Artist Based on Fuzzy Membership to Improve the Principal Component Analysis of Robust KernelJian Yao, Zhang Kaifeng. 322-326 [doi]
- A Security-Aware Data Placement Mechanism for Big Data Cloud Storage SystemsSeungmin Kang, Bharadwaj Veeravalli, Khin Mi Mi Aung. 327-332 [doi]
- Secure Mobile Payments Based on Cloud Services: Concepts and ExperimentsPascal Urien, Xavier Aghina. 333-338 [doi]
- Towards Extracting Drug-Effect Relation from Twitter: A Supervised Learning ApproachFan Yu, Melody Moh, Teng-Sheng Moh. 339-344 [doi]
- A Secure Biometric Identification Technique Using Spread Spectrum Audio WatermarkingYekta Said Can, Fatih Alagöz. 345-350 [doi]
- Self-Healing Intrusion Detection System ConceptViktoriya Degeler, Richard French, Kevin Jones. 351-356 [doi]
- Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive ProcessChen Zhong, John Yen, Peng Liu 0005, Robert F. Erbacher. 357-363 [doi]
- Compressing Large Amounts of NetFlow Data Using a Pattern Classification SchemeRemon Cornelisse, Mortaza S. Bargh, Sunil Choenni, Debora E. G. Moolenaar, Luc V. de Zeeuw. 364-370 [doi]
- Adaptive Combinatorial Key Scheme for Mobile Heterogeneous Wireless Sensor NetworksWael Hosny Fouad Aly. 371-376 [doi]
- Vulnerability Evaluation Accelerator for Lightweight CiphersMasaya Yoshikawa, Yusuke Nozaki, Kensaku Asahi. 377-381 [doi]
- TRAS: A Trust-Based Routing Protocol for Ad Hoc and Sensor NetworksImad Jawhar, Farhan Mohammed, Jameela Al-Jaroodi, Nader Mohamed. 382-387 [doi]
- Towards Trusted and Efficient UAV-Based CommunicationFarhan Mohammed, Imad Jawhar, Nader Mohamed, Ahmed Idries. 388-393 [doi]
- Intelligent Data Mining for Translator Correctness PredictionYulia Rossikova, J. Jenny Li, Patricia Morreale. 394-399 [doi]
- Contextual-Aware Hybrid Recommender System for Mixed Cold-Start Problems in Privacy ProtectionVicky Na Zhao, Melody Moh, Teng-Sheng Moh. 400-405 [doi]
- Spectral Clustering Technique for Classifying Network AttacksAnna Little, Xenia Mountrouidou, Daniel Moseley. 406-411 [doi]
- An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data StorageSalah H. Abbdal, Hai Jin 0001, Ali A. Yassin, Zaid Ameen Abduljabbar, Mohammed Abdulridha Hussain, Zaid Alaa Hussien, Deqing Zou. 412-417 [doi]
- RuleSN: Research and Application of Social Network Access Control ModelLi Ma, Lixin Tao, Yong Zhong, Keke Gai. 418-423 [doi]
- Using UAVs to Secure Linear Wireless Sensor NetworksNader Mohamed, Haya AlDhaheri, Khadeijah Almurshidi, Mahra Al-Hammoudi, Salama Al-Yalyali, Imad Jawhar, Jameela Al-Jaroodi. 424-429 [doi]