Abstract is missing.
- Power and Performance Study of HPC Applications on QCT Developer CloudPaul Young, Probha Madhavan, Gong-Do Hwang. 1-5 [doi]
- Speed Up Weather Prediction on QCT Developer Cloud: A Case Study on Knights Landing PlatformGong-Do Hwang, Stephen Chang. 6-9 [doi]
- Performance Study of Ceph Storage with Intel Cache Acceleration Software: Decoupling Hadoop MapReduce and HDFS over Ceph StorageVeda Shankar, Roscoe Lin. 10-13 [doi]
- Evaluation of Combining Bootstrap with Multiple Imputation Using R on Knights Landing PlatformChuan Zhou, Yuxiang Gao, Waylon Howard. 14-17 [doi]
- Performance of Scientific Simulations on QCT Developer Cloud: A Case Study of Molecular Dynamic and Quantum Chemistry SimulationsPrabha Madhavan, Paul Young, Stephen Chang. 18-21 [doi]
- Customized HPC Cluster Software Stack on QCT Developer CloudStephen Chang, Andy Pan. 22-26 [doi]
- Family Relationship Inference Using Knights Landing PlatformYuxiang Gao, Wei-min Chen. 27-30 [doi]
- Finding the Best Box-Cox Transformation in Big Data with Meta-Model Learning: A Case Study on QCT Developer CloudYuxiang Gao, Tongling Zhang, Baijian Yang. 31-34 [doi]
- Performance of Caffe on QCT Deep Learning Reference Architecture - A Preliminary Case StudyVeda Shankar, Stephen Chang. 35-39 [doi]
- An Improved Budget-Deadline Constrained Workflow Scheduling Algorithm on Heterogeneous ResourcesTing Sun, Chuangbai Xiao, Xiujie Xu, Guozhong Tian. 40-45 [doi]
- Security Threats and Challenges in Cloud ComputingAbdulaziz Alshammari, Sulaiman Alhaidari, Ali Alharbi, Mohamed Zohdy. 46-51 [doi]
- Privacy-Preserving and Secure Recommender System Enhance with K-NN and Social TaggingRahul Katarya, Om Prakash Verma. 52-57 [doi]
- Unsupervised Anomaly Detection Algorithm of Graph Data Based on Graph KernelLili Zhang, Huibin Wang, Chenming Li, Yehong Shao, Qing Ye. 58-63 [doi]
- Advanced Fully Homomorphic Encryption Scheme Over Real NumbersKeke Gai, Meikang Qiu, Yujun Li, Xiao-Yang Liu. 64-69 [doi]
- Research on Faceted Search Method for Water Data Catalogue ServiceJun Feng, Shengqiu Kong, Bingshuai Du, Jiamin Lu. 70-75 [doi]
- Secure Framework for Future Smart CityHamza Djigal, Feng Jun, Jiamin Lu. 76-83 [doi]
- Power Control Weakness in Long Term Evolution NetworkWeilian Su, Too Huseh Tien, Tri T. Ha. 84-90 [doi]
- Security Analysis of Email SystemsTianlin Li, Amish Mehta, Ping Yang 0002. 91-96 [doi]
- Machine Learning for Anomaly Detection and Categorization in Multi-Cloud EnvironmentsTara Salman, Deval Bhamare, Aiman Erbad, Raj Jain, Mohammed Samaka. 97-103 [doi]
- Quality Check and Analysis of BeiDou and GPS Observation Data in the Experiment of Air-Gun in ReservoirMing-Quan Hong, Wen-Bo Zhao, Guang Chen, Chaoxian Chen, Zi-Yan Wang. 104-107 [doi]
- An Efficient Secure Storage Scheme Based on Information FragmentationHan Qiu, Gérard Memmi, Hassan Noura. 108-113 [doi]
- Machine Learning Based DDoS Attack Detection from Source Side in CloudZecheng He, Tianwei Zhang, Ruby B. Lee. 114-120 [doi]
- CIRA Perspective on Risks Within UnRizkNow - A Case StudyVivek Agrawal, Adam Szekeres. 121-126 [doi]
- Architecting Cyber Defense: A Survey of the Leading Cyber Reference Architectures and FrameworksRisa Savold, Natalie Dagher, Preston Frazier, Dennis McCallam. 127-138 [doi]
- Distributed Shuffle Index in the Cloud: Implementation and EvaluationEnrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati. 139-144 [doi]
- Vulnerability Assessment for Security in Aviation Cyber-Physical SystemsSathish A. P. Kumar, Brian Xu. 145-150 [doi]
- End-to-End IoT Security Middleware for Cloud-Fog CommunicationBidyut Mukherjee, Roshan Lal Neupane, Prasad Calyam. 151-156 [doi]
- A Cloud-Based Service Delivery Platform for Effective Homeland SecurityPethuru Raj Chelliah, Sathish A. P. Kumar. 157-162 [doi]
- SQLIIDaaS: A SQL Injection Intrusion Detection Framework as a Service for SaaS ProvidersMohamed Yassin, Hakima Ould-Slimane, Chamseddine Talhi, Hanifa Boucheneb. 163-170 [doi]
- Scalable Agentless Cloud Network MonitoringMorgan Brattstrom, Patricia Morreale. 171-176 [doi]
- Improving the Energy Efficiency for Parallel Applications Running on ClustersWeifeng Liu, Bin Gong, Meng Guo. 177-186 [doi]
- mPSI: Many-to-one Private Set IntersectionKeji Hu, Wensheng Zhang. 187-192 [doi]
- Network Anomaly Detection with Stochastically Improved Autoencoder Based ModelsR. Can Aygun, A. Gokhan Yavuz. 193-198 [doi]
- Deterministic Dendritic Cell Algorithm Application to Smart Grid Cyber-Attack DetectionObinna Igbe, Ihab Darwish, Tarek N. Saadawi. 199-204 [doi]
- Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud NetworksSunhee Baek, Donghwoon Kwon, Jinoh Kim, Sang C. Suh, Hyunjoo Kim, Ikkyun Kim. 205-210 [doi]
- An Improved Straggler Identification Scheme for Data-Intensive Computing on Cloud PlatformsWei Dai, Ibrahim Adel Ibrahim, Mostafa A. Bassiouni. 211-216 [doi]
- Secure Extraction of Image Data Based on Optimized Transform MethodReena Gunjan, Priyam Pandia, Rajeev Mohnot. 217-222 [doi]
- Waveband Selection Based Feature Extraction Using Genetic AlgorithmYujun Li, Kun Liang, Xiaojun Tang, Keke Gai. 223-227 [doi]
- A Highly-Secure Self-Protection Data Scheme in Clouds Using Active Data Bundles and Agent-Based Secure Multi-party ComputationAkram Y. Sarhan, Steve Carr. 228-236 [doi]
- Fuzzing the Font Parser of Compound DocumentsHongliang Liang, Yuying Wang, Huayang Cao, Jiajie Wang. 237-242 [doi]
- A Novel Method Makes Concolic System More EffectiveHongliang Liang, Zhengyu Li, Minhuan Huang, Xiaoxiao Pei. 243-248 [doi]
- A New Energy Efficient VM Scheduling Algorithm for Cloud Computing Based on Dynamic ProgrammingKepi Zhang, Tong Wu, Siyuan Chen, Linsen Cai, Chao Peng. 249-254 [doi]
- Identifying Suspicious User Behavior with Neural NetworksMartin Ussath, David Jaeger, Feng Cheng 0002, Christoph Meinel. 255-263 [doi]
- A Framework for the Information Classification in ISO 27005 StandardVivek Agrawal. 264-269 [doi]
- An Improved Replica Placement Policy for Hadoop Distributed File System Running on Cloud PlatformsWei Dai, Ibrahim Adel Ibrahim, Mostafa A. Bassiouni. 270-275 [doi]
- Malware Fingerprinting under UncertaintyKrishnendu Ghosh, William Casey, Jose Andre Morales, Bud Mishra. 276-286 [doi]
- A Security Analysis Method for Supercomputing Users' BehaviorGuanghui Zhu, Yunhui Zeng, Meng Guo. 287-293 [doi]
- IoT Eye An Efficient System for Dynamic IoT Devices Auto-discovery on Organization LevelJie Shen, Ying Li, Bo Li, Hanteng Chen, Jianxin Li. 294-299 [doi]
- Brain-Based Computer Interfaces in Virtual RealitySukun Li, Avery Leider, Meikang Qiu, Keke Gai, Meiqin Liu. 300-305 [doi]
- An Overview of Wireless Network SecurityAlireza Kavianpour, Michael C. Anderson. 306-309 [doi]
- Enhancing Precision and Bandwidth in Cloud Computing: Implementation of a Novel Floating-Point Format on FPGAJunjie Hou, Yongxin Zhu, Yulan Shen, Mengjun Li, Qian Wu, Han Wu. 310-315 [doi]
- Design of Virtualization Framework to Detect Cyber Threats in Linux EnvironmentDmita Levy, Hardik A. Gohel, Himanshu Upadhyay, Alexander Pons, Leonel E. Lagos. 316-320 [doi]
- Event Detection with Multivariate Water Parameters in the Water Monitoring ApplicationsYingchi Mao, Hai Qi, Xiaoli Chen, Xiaofang Li. 321-326 [doi]
- Analysis of Cybersecurity Based on Li-Fi in Green Data Storage EnvironmentsVijey Thayananthan, Omar A. Abdulkader, Kamal Jambi, Alwi M. Bamahdi. 327-332 [doi]
- HDFT++ Hybrid Data Flow Tracking for SaaS Cloud ServicesAlexander Fromm, Vladislav Stepa. 333-338 [doi]
- Email Visualization Correlation Analysis Forensics ResearchZhenya Chen, Ying Yang, Lijuan Chen, Liqiang Wen, Jizhi Wang, Guang Yang, Meng Guo. 339-343 [doi]
- Developing a Conceptual National Information Sharing Security Framework to Combat Cybercrimes in JordanMohammad A. A. Alhawamdeh. 344-350 [doi]
- Secure Cloud Container: Runtime Behavior Monitoring Using Most Privileged Container (MPC)Vivek Vijay Sarkale, Paul Rad, Wonjun Lee. 351-356 [doi]
- Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MACRajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya. 357-362 [doi]
- FUD - Balancing Scheduling Parameters in Shared Computing EnvironmentsArt Sedighi, Milton Smith, Yuefen Deng. 363-368 [doi]
- An Offline Online Strategy for IoT Using MQTTArya Sahadevan, Deepa Mathew, Jairam Mookathana, Bijoy Antony Jose. 369-373 [doi]