Abstract is missing.
- Cyber Security, a Threat to Cyber Banking in South Africa: An Approach to Network and Application SecurityThierry Mbah Mbelli, Barry Dwolatzky. 1-6 [doi]
- Wormhole Detection in Secured BGP NetworksYoussef Gahi, Junaid Israr, Mouhcine Guennoun. 7-11 [doi]
- Electricity Cost Management for Cloud Data Centers under Diverse Delay ConstraintsYuqi Fan, Yongfeng Xia, Yuheng Liu, Xiaohui Yuan. 12-19 [doi]
- SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud StorageQiumao Ma, Jinsheng Zhang, Yang Peng, Wensheng Zhang, Daji Qiao. 20-25 [doi]
- Controlling a Car Through OBD InjectionYu Zhang, Binbin Ge, Xiang Li, Bin Shi, Bo Li. 26-29 [doi]
- A Novel Software Defined Networking Framework for Cloud EnvironmentsYukun Zhang, Bo Li. 30-35 [doi]
- Saphena: An Approach for Analyzing Similarity of Heterogeneous Policies in Cloud EnvironmentLi Lin, Jian Hu, Xinya Mao, Jian-biao Zhang. 36-41 [doi]
- A Cluster-Based Intrusion Detection Framework for Monitoring the Traffic of Cloud EnvironmentsBo Li, Peng Liu, Li Lin. 42-45 [doi]
- Towards an Out-of-the-Box Cloud Application Monitoring FrameworkJianjun Li, Wei Li, Ming Li. 46-49 [doi]
- CloudAuditor: A Cloud Auditing Framework Based on Nested VirtualizationZhe Wang, Jin Zeng, Tao Lv, Bin Shi, Bo Li. 50-53 [doi]
- A New Block-Based Data Distribution Mechanism in Cloud ComputingChandrima Dadi, Ping Yi, Zongming Fei, Hui Lu. 54-59 [doi]
- An Analysis of Server-Side Design for Seed-Based Mobile AuthenticationLongbin Chen, Li-Chiou Chen, Nader Nassar, Meikang Qiu. 60-65 [doi]
- Efran (O): "Efficient Scalar Homomorphic Scheme on MapReduce for Data Privacy Preserving"Konan Martin, Wenyong Wang, Brighter Agyemang. 66-74 [doi]
- MongoDB NoSQL Injection Analysis and DetectionBoyu Hou, Kai Qian, Lei Li, Yong Shi, Lixin Tao, Jigang Liu. 75-78 [doi]
- A Framework Research of Power Grid Knowledge Recommendation and Situation Reasoning Based on Cloud Computing and CEPJian Su, Yu Huang, Guangxian Lv, Haitao Liu, Peng Jin. 79-83 [doi]
- Sequence-Based Analysis of Static Probe Instrumentation Data for a VMM-Based Anomaly Detection SystemAdy Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi. 84-94 [doi]
- A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor NetworksMounib Khanafer, Youssef Gahi, Mouhcine Guennoun, Hussein T. Mouftah. 95-101 [doi]
- Security Vulnerabilities and Countermeasures for Time Synchronization in IEEE802.15.4e NetworksWei Yang, Qin Wang, Yadong Wan, Jie He. 102-107 [doi]
- A Threshold Multi-server Protocol for Password-Based AuthenticationMengxiang Guan, Jiaxing Song, Weidong Liu 0001. 108-118 [doi]
- Shortest Processing Time First Algorithm for HadoopLaurent Bobelin, Patrick Martineau, Di Zhao, Haiwu He. 119-123 [doi]
- Resource Optimization Strategy for CPU Intensive Applications in Cloud Computing EnvironmentJunjie Peng, Jinbao Chen, Shuai Kong, Danxu Liu, Meikang Qiu. 124-128 [doi]
- Empirical Study of Using Big Data for Business Process Improvement at Private Manufacturing Firm in Cloud ComputingZiqi Wang, Haihui Zhao. 129-135 [doi]
- On-demand Pseudonym Systems in Geo-Distributed Mobile Cloud ComputingJiawen Kang, Rong Yu, Xumin Huang, Sabita Maharjan, Yan Zhang. 136-141 [doi]
- A Reinforcement Learning-Based Mixed Job Scheduler Scheme for Cloud Computing under SLA ConstraintZhiping Peng, Delong Cui, Yuanjia Ma, Jianbin Xiong, Bo Xu, Weiwei Lin. 142-147 [doi]
- A Multi-level Intelligent Selective Encryption Control Model for Multimedia Big Data Security in Sensing System with Resource ConstraintsChen Xiao, Lifeng Wang, Zhu Jie, Tiemeng Chen. 148-153 [doi]
- A Consolidation Strategy Supporting Resources Oversubscription in Cloud ComputingYing Liu. 154-162 [doi]
- R-Learning and Gaussian Process Regression Algorithm for Cloud Job Access ControlZhiping Peng, Delong Cui, Yuanjia Ma, Jianbin Xiong, Bo Xu, Weiwei Lin. 163-166 [doi]
- Survey on Data Integrity in CloudKamile Nur Sevis, Ensar Seker. 167-171 [doi]
- A Correctness Verification Method for C Programs Based on VCCHongliang Liang, Daijie Zhang, Xiaoxiao Pei, Xiaodong Jia, Guangyuan Li, Jiuyun Xu. 172-177 [doi]
- Mobile App Collusions and Its Cyber Security ImplicationsAbdullahi Arabo. 178-183 [doi]
- A Universal Algorithm to Secure Stolen Mobile Devices Using Wi-Fi in Indoors EnvironmentsWei Ding, Jose Arriaga. 184-189 [doi]
- Toward a Big Data Architecture for Security Events AnalyticLeila Fetjah, Karim Benzidane, Hassan El Alloussi, Othman El Warrak, Said Jai-Andaloussi, Abderrahim Sekkaki. 190-197 [doi]
- Energy-Aware Optimal Task Assignment for Mobile Heterogeneous Embedded Systems in Cloud ComputingKeke Gai, Meikang Qiu, Hui Zhao, Meiqin Liu. 198-203 [doi]
- Keystroke Biometric User Verification Using Hidden Markov ModelMd Liakat Ali, Kutub Thakur, Charles C. Tappert, Meikang Qiu. 204-209 [doi]
- An Analysis of Information Security Event ManagersKutub Thakur, Sandra Kopecky, Moath Nuseir, Md Liakat Ali, Meikang Qiu. 210-215 [doi]
- Preparation of Graphene and Its Performance AnalysisWan Sheng. 216-219 [doi]
- Dynamic Android Malware Classification Using Graph-Based RepresentationsLifan Xu, Dong Ping Zhang, Marco A. Alvarez, Jose Andre Morales, Xudong Ma, John Cavazos. 220-231 [doi]
- SensIaas: A Sensor-Cloud Infrastructure with Sensor VirtualizationSunanda Bose, Nandini Mukherjee. 232-239 [doi]
- Powering Filtration Process of Cyber Security Ecosystem Using Knowledge GraphClaude Asamoah, Lixin Tao, Keke Gai, Ning Jiang. 240-246 [doi]
- Scalable Fog Computing with Service Offloading in Bus NetworksDongdong Ye, Maoqiang Wu, Shensheng Tang, Rong Yu. 247-251 [doi]
- A Remote Backup Approach for Virtual Machine ImagesZhe Wang, Jin Zeng, Tao Lv, Bin Shi, Bo Li. 252-255 [doi]
- An Improved Matrix Encoding Steganography Algorithm Based on H.264 VideoLiyun Qian, Zhitang Li, Pei Zhou, Jian Chen. 256-260 [doi]
- A Semantic Approach to Intelligent and Personal Tutoring SystemMaria Sette, Lixin Tao, Keke Gai, Ning Jiang. 261-266 [doi]
- Reducing Complexity of Diagnostic Message Pattern Specification and Recognition on In-Bound Data Using Semantic TechniquesGilbert Alipui, Lixin Tao, Keke Gai, Ning Jiang. 267-272 [doi]
- Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud ComputingKeke Gai, Meikang Qiu, Hui Zhao, Jian-xiong. 273-278 [doi]
- Improving Data Governance in Large Organizations through Ontology and Linked DataR. J. DeStefano, Lixin Tao, Keke Gai. 279-284 [doi]
- Drug Side Effects Data Representation and Full Spectrum Inferencing Using Knowledge Graphs in Intelligent TelehealthSaravanan Jayaraman, Lixin Tao, Keke Gai, Ning Jiang. 289-294 [doi]
- Understanding Taxonomy of Cyber Risks for Cybersecurity Insurance of Financial Industry in Cloud ComputingSam Adam Elnagdy, Meikang Qiu, Keke Gai. 295-300 [doi]
- Cyber Incident Classifications Using Ontology-Based Knowledge Representation for Cybersecurity Insurance in Financial IndustrySam Adam Elnagdy, Meikang Qiu, Keke Gai. 301-306 [doi]