Abstract is missing.
- Efficiency-Aware Workload Optimizations of Heterogeneous Cloud Computing for Capacity Planning in Financial IndustryKeke Gai, Zhihua Du, Meikang Qiu, Hui Zhao. 1-6 [doi]
- Game Theoretic Modeling to Enforce Security Information Sharing among FirmsDeepak K. Tosh, Shamik Sengupta, Sankar Mukhopadhyay, Charles A. Kamhoua, Kevin A. Kwiat. 7-12 [doi]
- Enhancing Confidentiality and Privacy of Outsourced Spatial DataAyesha M. Talha, Ibrahim Kamel, Zaher Al Aghbari. 13-18 [doi]
- Adaptive Resource Allocation Optimization in Heterogeneous Mobile Cloud SystemsLongbin Chen, Yucong Duan, Meikang Qiu, Jian-xiong, Keke Gai. 19-24 [doi]
- Performance Metrics of Local Cloud Computing ArchitecturesTravis Brummett, Pezhman Sheinidashtegol, Debadrita Sarkar, Michael Galloway. 25-30 [doi]
- Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud EnvironmentSyed Rizvi, Abdul Razaque, Katie Cover. 31-36 [doi]
- Design of Detecting Botnet Communication by Monitoring Direct Outbound DNS QueriesYong Jin, Hikaru Ichise, Katsuyoshi Iida. 37-41 [doi]
- An Approach to Minimize Crossings in Phylogenetic TreesMd Liakat Ali, Kutub Thakur, John V. Monaco, Meikang Qiu. 42-47 [doi]
- Privacy-Preserving Data Exfiltration Monitoring Using Homomorphic EncryptionKurt Rohloff. 48-53 [doi]
- Implementing Migration-Aware Virtual MachinesTaimur Al Said, Omer F. Rana. 54-61 [doi]
- CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc NetworksPandi Vijayakumar, M. Azees, L. Jegatha Deborah. 62-67 [doi]
- Integral Attack on Reduced-Round RectangleHaruhisa Kosuge, Hidema Tanaka, Keisuke Iwai, Takakazu Kurokawa. 68-73 [doi]
- Anti-Counterfeit Scheme Using Monte Carlo Simulation for E-commerce in Cloud SystemsKeke Gai, Meikang Qiu, Hui Zhao, Wenyun Dai. 74-79 [doi]
- Using ELM Techniques to Predict Data Centre VM RequestsSalam Ismaeel, Ali Miri. 80-86 [doi]
- Search Engine: A Hidden Power for Virus Propagation in Community NetworksJia Yang, Cai Fu, Deliang Xu, Lansheng Han, Xiao-Yang Liu. 87-92 [doi]
- The Software Design of Car Low-Speed Intelligent Braking SystemFanbiao Bao, Baoshan Huang, Bing Li, Yonghe Jiao. 93-97 [doi]
- Ontology-Based Knowledge Representation for Secure Self-Diagnosis in Patient-Centered Teleheath with Cloud SystemsKeke Gai, Meikang Qiu, Saravanan Jayaraman, Lixin Tao. 98-103 [doi]
- Access Control for Multi-tenancy in Cloud-Based Health Information SystemsMohd Anwar, Ashiq Imran. 104-110 [doi]
- Secure and Efficient Personal Health Record Scheme Using Attribute-Based EncryptionKai Fan, Nana Huang, Yue Wang, Hui Li, Yintang Yang. 111-114 [doi]
- DOGCP: A Domain-Oriented Government Cloud Platform Based on PaaSYuanming Zhang, Kuan Ni, JiaWei Lu, Jun Xu, Gang Xiao. 115-120 [doi]
- An SDN-Based Fabric for Flexible Data-Center NetworksLongbin Chen, Meikang Qiu, Jian-xiong. 121-126 [doi]
- PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined NetworkingMengmeng Wang, Jianwei Liu, Jie Chen, Xiao Liu, Jian Mao. 127-132 [doi]
- CLMRS: Designing Cross-LAN Media Resources Sharing Based on DLNAFei Gu, Jianwei Niu, Zhenxue He, Meikang Qiu, Cuijiao Fu. 133-140 [doi]
- Smart Grid DNP3 Vulnerability Analysis and ExperimentationIhab Darwish, Obinna Igbe, Orhan Celebi, Tarek N. Saadawi, Joseph Soryal. 141-147 [doi]
- Context Awareness through Reasoning on Private Analysis for Android ApplicationHongmu Han, Ruixuan Li, Jinwei Hu, Meikang Qiu. 148-156 [doi]
- Enforcing Correct Behavior without Trust in Cloud Key-Value DatabasesAndrea Andreoli, Luca Ferretti, Mirco Marchetti, Michele Colajanni. 157-164 [doi]
- Class-Chord: Efficient Messages to Classes of Nodes in ChordDan Fleck, Fengwei Zhang, Sharath Hiremagalore, Stephen Reese, Liam McGhee. 165-174 [doi]
- Maintainable Mobile Model Using Pre-Cache Technology for High Performance Android SystemHui Zhao, Meikang Qiu, Keke Gai, Jie Li, Xin He. 175-180 [doi]
- "Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android ApplicationsAhmet Ilhan Aysan, Sevil Sen. 181-186 [doi]
- Threshold Attribute-Based Signcryption in Standard ModelHaibin Zheng, Jing Qin, Jiankun Hu, Qianhong Wu. 187-193 [doi]
- Towards Trustworthy Participants in Social Participatory NetworksGuangquan Xu, Bin Liu, Yuanyuan Ren, Runhe Huang, Gaoxu Zhang, Zhiyong Feng, Xiaohong Li. 194-199 [doi]
- Detection and Identification of Android Malware Based on Information Flow MonitoringRadoniaina Andriatsimandefitra, Valérie Viet Triem Tong. 200-203 [doi]
- Intelligent Traffic Light Model Based on Grey-Markov Model and Improved Ant Colony Optimization for Dynamic Route GuidanceJiaxu Zhao, Zhide Chen, YaLi Zeng. 204-212 [doi]
- Designing ARINC653 Partition Constrained Scheduling for Secure Real Time Embedded AvionicsXiang Tao, Yongxin Zhu, Yishu Mao, Han Song, Mengyun Liu, Xinyi Liu, Weiguang Sheng, Weiwei Shi. 213-217 [doi]
- Energy Optimization of Air-Based Information Network with Guaranteed Security ProtectionXiao Liu, Meikang Qiu, Xiaodong Wang, Weiran Liu, Kaiquan Cai. 218-223 [doi]
- Detecting Kernel Vulnerabilities During the Development PhaseNezer Jacob Zaidenberg, Eviatar Khen. 224-230 [doi]
- Feature Analysis of Important Nodes in MicroblogYang Yang, Hui Xu, Yanan Liu, Zhongwei Li, Weishan Zhang, Xin Liu. 231-236 [doi]
- An Uneven Distributed System for Dynamic Taint Analysis FrameworkXuefei Wang, Hengtai Ma, Ke Yang, Hongliang Liang. 237-240 [doi]
- Survey on Privacy Protection of Android DevicesHongliang Liang, Dongyang Wu, Jiuyun Xu, Hengtai Ma. 241-246 [doi]
- Small-Scale Cyber SecurityEmma Osborn, Andrew Simpson. 247-252 [doi]
- A Low Storage Phase Search Scheme Based on Bloom Filters for Encrypted Cloud ServicesHoi Ting Poon, Ali Miri. 253-259 [doi]
- A Three-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme for Line TopologyYoshiaki Shiraishi, Masami Mohri, Hitoshi Miyazaki, Masakatu Morii. 260-265 [doi]
- Efficiently Managing Encrypted Data in Cloud DatabasesOsama M. Ben Omran, Brajendra Panda. 266-271 [doi]
- Meta Meta-Analytics for Risk Forecast Using Big Data Meta-Regression in Financial IndustryHevel Jean-Baptiste, Meikang Qiu, Keke Gai, Lixin Tao. 272-277 [doi]
- City of White Plains Parking App: Case Study of a Smart City Web ApplicationAri Butowsky, Keke Gai, Michael Coakley, Meikang Qiu, Charles C. Tappert. 278-282 [doi]
- A Simulation Modeling Method Based on Petri NetYu Huang, Xuanzheng Hu, Guangxian Lv, Renfan Yang. 283-288 [doi]
- A Novel Anomaly Detection Approach for Mitigating Web-Based Attacks Against CloudsSimin Zhang, Bo Li, Jianxin Li, Mingming Zhang, Yang Chen. 289-294 [doi]
- Detection of Malware and Kernel-Level Rootkits in Cloud Computing EnvironmentsThu Yein Win, Huaglory Tianfield, Quentin Mair. 295-300 [doi]
- Understanding Model Risk Management - Model Rationalization in Financial IndustryHevel Jean-Baptiste, Lixin Tao, Meikang Qiu, Keke Gai. 301-306 [doi]
- An Investigation on Cyber Security Threats and Security ModelsKutub Thakur, Meikang Qiu, Keke Gai, Md Liakat Ali. 307-311 [doi]
- Model Risk Management Systems-Back-End, Middleware, Front-End and AnalyticsHevel Jean-Baptiste, Meikang Qiu, Keke Gai, Lixin Tao. 312-316 [doi]
- A Lightweight Detection of the RFID Unauthorized Reading Using RF ScannersWenqing Zhang, Shijie Zhou, Jiaqing Luo, Hongrong Cheng, Yongjian Liao. 317-322 [doi]
- A Reliable Broadcasting Algorithm in Locally Twisted CubesBaolei Cheng, Jianxi Fan, Dajin Wang, Jiwen Yang. 323-328 [doi]
- An Extreme Learning Machine (ELM) Predictor for Electric Arc Furnaces' v-i CharacteristicsSalam Ismaeel, Ali Miri, Alireza Sadeghian, Dharmendra Chourishi. 329-334 [doi]
- Remote Attestation of Software and Execution-Environment in Modern MachinesMichael Kiperberg, Amit Resh, Nezer Jacob Zaidenberg. 335-341 [doi]
- Face Recognition with Environment Tolerance on a Mobile DevicePhilip J. Riesch, Xiaojiang Du, Haibin Ling, Michael J. Mayhew. 342-348 [doi]
- Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection SystemsWaqas Haider, Jiankun Hu, Xinghuo Yu, Yi Xie. 349-355 [doi]
- Next Generation of Impersonator Bots: Mimicking Human Browsing on Previously Unvisited SitesYang Yang, Natalija Vlajic, U. T. Nguyen. 356-361 [doi]
- SMM-Based Hypervisor Integrity MeasurementWilliam Augusto Rodrigues de Souza, Allan Tomlinson. 362-367 [doi]
- QRToken: Unifying Authentication Framework to Protect User Online IdentityFei Xu, Sheng Han, Ying Wang, Jian Zhang, Yong Li. 368-373 [doi]
- Split-System: The New Frontier of Cloud ComputingBharat S. Rawal, Ramesh K. Karne, Quiang Duan. 374-381 [doi]
- Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic ApproachCharles A. Kamhoua, Andrew Martin, Deepak K. Tosh, Kevin A. Kwiat, Chad Heitzenrater, Shamik Sengupta. 382-389 [doi]
- Multi-step Attack Pattern Detection on Normalized Event LogsDavid Jaeger, Martin Ussath, Feng Cheng 0002, Christoph Meinel. 390-398 [doi]
- Towards an Early Warning System for Network Attacks Using Bayesian InferenceHarsha Kumara Kalutarage, Chonho Lee, Siraj Ahmed Shaikh, Francis Lee Bu Sung. 399-404 [doi]
- Towards Secure and Dependable Cloud Storage Based on User-Defined WorkflowsJedidiah Yanez-Sierra, Arturo Diaz-Perez, Victor Sosa-Sosa, J. L. Gonzalez. 405-410 [doi]
- Combination in Advance Batch Multi-exponentiation on Elliptic CurveRui Tao, Jianwei Liu, Hang Su, Yang Sun, Xiao Liu. 411-416 [doi]
- MR-Graph: A Customizable GPU MapReduceZhi Qiao, Shuwen Liang, Hai Jiang, Song Fu. 417-422 [doi]
- Safe Internet Browsing Using a Transparent Virtual BrowserJeffrey Bickford, Paul Giura. 423-432 [doi]
- Improved Ant Colony Algorithm for Finding the Maximum Clique in Social NetworkSuqi Zhang, Yongfen Dong, Jun Yin, Jngjin Guo. 433-438 [doi]
- Computational Security Evaluation of Light-Weight Block Cipher Against Integral Attack by GPGPUHaruhisa Kosuge, Hidema Tanaka, Keisuke Iwai, Takakazu Kurokawa. 439-444 [doi]
- Website Forgery: Understanding Phishing Attacks and Nontechnical CountermeasuresIbrahim Waziri. 445-450 [doi]
- Security Issues in WSNs with Cooperative CommunicationThaier Hayajneh, Tao Zhang, Bassam Jamil Mohd. 451-456 [doi]
- Tunable Performance and Consistency Tradeoffs for Geographically Replicated Cloud Services (COLOR)Wenbo Zhu, C. Murray Woodside. 457-463 [doi]
- Detecting Malware for Android Platform: An SVM-Based ApproachWenjia Li, Jigang Ge, Guqian Dai. 464-469 [doi]
- Open Source Cloud Management Platforms: A ReviewSalam Ismaeel, Ali Miri, Dharmendra Chourishi, S. M. Reza Dibaj. 470-475 [doi]
- Two-Way Graphic Password for Mobile User AuthenticationMing Jiang, Ai He, Kuangyu Wang, Zhengyi Le. 476-481 [doi]
- Ability and Hurdle to Provide Banking Online Services: A Case Study of Banking Employees in NigeriaJoseph Funsho Omonaiye, V. V. Madhavi Lalitha, Habib Ullah Khan, Sheila D. Fournier-Bonilla, Rajvir Singh. 482-487 [doi]
- Forward Secure On-device Encryption Scheme Withstanding Cold Boot AttackS. Sree Vivek, Rajkumar Ramasamy. 488-493 [doi]
- Extending OWL to Support Custom RelationsKhagesh Patel, Ishaan Dube, Lixin Tao, Ning Jiang. 494-499 [doi]
- Improved Differential Characteristic Searching MethodsJiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh. 500-508 [doi]
- PhD Forum: A System Identification Approach to Monitoring Network Traffic SecurityQuentin Mayo, Renée C. Bryce, Ram Dantu. 509-511 [doi]
- Handling System Overload Resulting from DDoS Attacks and Flash Crowd EventsZaid Al-Ali, Basheer Al-Duwairi, Ahmad T. Al-Hammouri. 512 [doi]
- Predicting Vulnerability Exploits in the WildMichel Edkrantz, Staffan Truvé, Alan Said. 513-514 [doi]
- An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness TestTianyu Chen, Yuan Ma, Jingqiang Lin, Zhan Wang, Jiwu Jing. 515-517 [doi]
- A Strategy to Improve the Efficiency of I/O Intensive Application in Cloud Computing EnvironmentLujin You, Junjie Peng, Ming Chen, Meikang Qiu. 518-523 [doi]
- Research on Application Classification Method in Cloud Computing EnvironmentJinbao Chen, Junjie Peng, Xiaofei Zhi, Meikang Qiu. 524-529 [doi]
- A Dependable Service Path Searching Method in Distributed Virtualized Environment Using Adaptive Bonus-Penalty Micro-Canonical AnnealingHuiqiang Wang, Shichen Zou, Junyu Lin, Guangsheng Feng, Hongwu Lv. 530-539 [doi]
- Seagull - A Real-Time Coflow Scheduling SystemZhouwang Fu, Tao Song, Sheng Wang, Fuzong Wang, Zhengwei Qi. 540-545 [doi]