Abstract is missing.
- Mining Web Technical Discussions to Identify Malware CapabilitiesJoshua Saxe, David Mentis, Christopher Greamo. 1-5 [doi]
- Malware Similarity Identification Using Call Graph Based System Call Subsequence FeaturesKristina Blokhin, Joshua Saxe, David Mentis. 6-10 [doi]
- The Middle East under Malware Attack Dissecting Cyber WeaponsSami Zhioua. 11-16 [doi]
- Anonymous Data Forwarding in Human Associated Delay Tolerant NetworksLongxiang Gao, Ming Li, Wanlei Zhou, Wen Shi. 17-21 [doi]
- A Scalable and Privacy-Preserving Named Data Networking Architecture Based on Bloom FiltersEmmanuel Alphonce Massawe, Suguo Du, Haojin Zhu. 22-26 [doi]
- Fault-Aware Flow Control and Multi-Path Routing in Wireless Sensor NetworksXiaomei Zhang, Xiaolei Dong, Jie Wu 0001, Xiuqi Li, Naixue Xiong. 27-32 [doi]
- Attacking Tor through Unpopular PortsMuhammad Aliyu Sulaiman, Sami Zhioua. 33-38 [doi]
- A Method to Automatically Filter Log Evidences for Intrusion ForensicsJian Zhang, Xiao Fu, Xiaojiang Du, Bin Luo, Zhihong Zhao. 39-44 [doi]
- Data-Centric Access Control with Confidentiality for Collaborating Smart Grid Services Based on Publish/Subscribe ParadigmYang Zhang, Junliang Chen. 45-50 [doi]
- SoNet - Privacy and Replication in Federated Online Social NetworksLorenz Schwittmann, Christopher Boelmann, Matthäus Wander, Torben Weis. 51-57 [doi]
- Secure Cache Provision: Provable DDOS Prevention for Randomly Partitioned Services with ReplicationWeibo Chu, Xiaohong Guan, John C. S. Lui, Zhongmin Cai, Xiaohong Shi. 58-63 [doi]
- Privacy Preserving Query Answering in Peer Data Management SystemsAzade Nazi, Donggang Liu, Sajal K. Das. 64-69 [doi]
- Practical and Secure Outsourcing of Matrix Computations to the CloudMohamed Nassar, Abdelkarim Erradi, Qutaibah M. Malluhi. 70-75 [doi]
- Flow-Based Anomaly Detection Using Neural Network Optimized with GSA AlgorithmZahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Mansour Sheikhan. 76-81 [doi]
- Utilization-Aware Allocation for Multi-Tenant DatacentersYang Gao, Yibo Xue, Jun Li. 82-87 [doi]
- CPU Load Prediction Using Support Vector Regression and Kalman Smoother for CloudRongdong Hu, Jingfei Jiang, Guangming Liu, Lixin Wang. 88-92 [doi]
- Migration-Based Elastic Consolidation Scheduling in Cloud Data CenterQingjia Huang, Sen Su, Siyuan Xu, Jian Li, Peng Xu, Kai Shuang. 93-97 [doi]
- Towards Fast and Efficient Failure Handling for Paxos State MachinesLeander Jehl, Hein Meling. 98-102 [doi]
- Designing a Middleware API for Building Private IaaS Cloud ArchitecturesGabriel Loewen, Michael Galloway, Susan V. Vrbsky. 103-107 [doi]
- The Glasgow Raspberry Pi Cloud: A Scale Model for Cloud Computing InfrastructuresFung Po Tso, David Robert White, Simon Jouet, Jeremy Singer, Dimitrios P. Pezaros. 108-112 [doi]
- SmartShuffle: Managing Online Virtual Machine Shuffle in Virtualized Data CentersPeng Zhang, Hongbo Wang, Junbo Li, Jiankang Dong, Yangyang Li, Shiduan Cheng. 113-118 [doi]
- A Polymorphic Model for Event Associated Workload BurstsMatthew Sladescu, Alan Fekete, Kevin Lee, Anna Liu. 119-125 [doi]
- Verifiable Phrase Search over Encrypted Data Secure against a Semi-Honest-but-Curious AdversaryZachary A. Kissel, Jie Wang. 126-131 [doi]
- Energy Saving Virtual Machine Allocation in Cloud ComputingRuitao Xie, Xiaohua Jia, Kan Yang, Bo Zhang. 132-137 [doi]
- A Simulation Framework to Evaluate Virtual CPU Scheduling AlgorithmsCuong Pham, Qingkun Li, Zachary Estrada, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 138-143 [doi]
- Towards Seamless Cross-Vendor Inter-Datacenter Network Policy MigrationChunyang Lu, Zhixiong Jiang, Jinping Yu, Gan Zhang, Wei Liang, Jingping Bi. 144-149 [doi]
- Ensuring Beta-Availability in P2P Social NetworksNashid Shahriar, Shihabur Rahman Chowdhury, Mahfuza Sharmin, Reaz Ahmed, Raouf Boutaba, Bertrand Mathieu. 150-155 [doi]
- Yelp Events: Making Bricks Without Clay?Jaime Ballesteros, Bogdan Carbunar, Mahmudur Rahman, Naphtali Rishe. 156-161 [doi]
- SONET: A SOcial NETwork Model for Privacy Monitoring and RankingRaj Kumar Nepali, Yong Wang. 162-166 [doi]
- Access Control in Social Enterprise Applications: An Empirical EvaluationRafae Bhatti, Camille Gaspard, Cristina Nita-Rotaru. 167-171 [doi]
- Capturing Connectivity Graphs of a Large-Scale P2P Overlay NetworkHani Salah, Thorsten Strufe. 172-177 [doi]
- SAS: Semantics Aware Search in P2P NetworksD. M. Rasanjalee Himali, Shamkant B. Navathe, Sushil K. Prasad. 178-183 [doi]
- A Framework for Peer-to-Peer Micro-BloggingH. Asthana, Ingemar J. Cox. 184-189 [doi]
- A Tweet-Centric Algorithm for News RankingBo Zhang, Jinchuan Wang, Lei Zhang. 190-195 [doi]
- Update Management in Decentralized Social NetworksSimon Forsyth, Khuzaima Daudjee. 196-201 [doi]
- Balanced and Predictable Networked StorageJaimie Kelley, Christopher Stewart. 202-207 [doi]
- Information Centric Networks for Parallel Processing in the DatacenterFabio Pianese. 208-213 [doi]
- DCNSim: A Data Center Network SimulatorYang Liu, Jogesh K. Muppala. 214-219 [doi]
- A Case for Heterogeneous Flash in the DatacenterDi Wang, Anand Sivasubramaniam, Bhuvan Urgaonkar. 220-225 [doi]
- Task Scheduling and Server Provisioning for Energy-Efficient Cloud-Computing Data CentersNing Liu, Ziqian Dong, Roberto Rojas-Cessa. 226-231 [doi]
- Modeling the Performance of Heterogeneous IaaS Cloud CentersHamzeh Khazaei, Jelena V. Misic, Vojislav B. Misic, Nasim Beigi Mohammadi. 232-237 [doi]
- Virtual Machine Placement for Improving Energy Efficiency and Network Performance in IaaS CloudJiankang Dong, Hongbo Wang, Xing Jin, Yangyang Li, Peng Zhang, Shiduan Cheng. 238-243 [doi]
- On Fairness-Efficiency Tradeoffs for Multi-resource Packet ProcessingWei Wang, Ben Liang, Baochun Li. 244-249 [doi]
- Distributed Multi-hop Network Association in Large-Scale Wireless Sensor NetworksHyung-Sin Kim, Jae-Seok Bang, Yong-Hwan Lee. 250-255 [doi]
- Multi-path Routing and Stream Scheduling with Spatial Multiplexing and Interference Cancellation in MIMO NetworksBo Zhang, Xiaohua Jia, Kan Yang, Ruitao Xie. 256-261 [doi]
- Energy-Efficient Clustering in IEEE 802.15.4 Wireless Sensor NetworksHamidreza Tavakoli, Jelena V. Misic, Majid Naderi, Vojislav B. Misic. 262-267 [doi]
- Energy-Efficient Protocol for Extending Battery Life in Wireless Sensor NetworksQian Zhao, Yukikazu Nakamoto, Zulfazli Hussin. 268-273 [doi]
- Using Directional Antenna for Continuous Moving Object Tracking in WSN with Uncovered HolesZhefeng Sun, Huan Li. 274-279 [doi]
- A Prototype Wireless Sensor Network for Precision AgricultureJonathan Jao, Bo Sun, Kui Wu. 280-285 [doi]
- AODV and OLSR Routing Protocols in MANETReza Malekian, Aleksandar Karadimce, Abdul Hanan Abdullah. 286-289 [doi]
- SmartParcel: A Collaborative Data Sharing Framework for Mobile Operating SystemsBhanu Kaushik, Honggang Zhang, Xinwen Fu, Benyuan Liu, Jie Wang. 290-295 [doi]
- The Cyber-Physical Marketplace: A Framework for Large-Scale Horizontal Integration in Distributed Cyber-Physical SystemsTilman Wolf, Michael Zink, Anna Nagurney. 296-302 [doi]
- A Data Analytic Engine Towards Self-Management of Cyber-Physical SystemsMin Ding, Haifeng Chen, Abhishek B. Sharma, Kenji Yoshihira, Guofei Jiang. 303-308 [doi]
- A Distributed Framework for Spatio-Temporal Analysis on Large-Scale Camera NetworksKirak Hong, Marco Völz, Venu Govindaraju, Bharat Jayaraman, Umakishore Ramachandran. 309-314 [doi]
- Performance of Coexisted WiFi and ZigBee NetworksYue Tao, Xiang-Yang Li, Cheng Bo. 315-320 [doi]
- Weapons against Cyber-Physical TargetsTimo Kiravuo, Mikko Särelä, Jukka Manner. 321-326 [doi]
- Pattern Regulator: Protecting Temporal Usage Privacy for Wireless Body Area Sensor NetworksLan Yao, Xiangyang Li, Ge Yu. 327-332 [doi]
- A Protocol for Efficient Transmissions in UASNsLi-Ling Hung, Yung-Jeng Luo. 333-338 [doi]
- SA-MAC: Self-Stabilizing Adaptive MAC Protocol for Wireless Sensor NetworksCheng Bo, Xiang-Yang Li, Yue Tao, Fouad Teymour, Paul Anderson, Shangping Ren. 339-344 [doi]
- Guaranteeing Asymptotic Stability of Clustering for MANET by Autonomous Decentralized Structure Formation Mechanism Based on Local InteractionRyo Hamamoto, Chisa Takano, Kenji Ishida, Masaki Aida. 345-350 [doi]
- Assuring Location Estimation Accuracy of Anchor-Free Mobile Localization in Wireless Sensor NetworksZulfazli Hussin, Yukikazu Nakamoto. 351-356 [doi]
- A Path Authenticating Method Using Bloom Filters against Impersonation Attacks on Relaying Nodes for Wireless Sensor NetworksNoriaki Tanabe, Eitaro Kohno, Yoshiaki Kakuda. 357-361 [doi]
- Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java ApplicationsMohamed Sharaf, Jie Huang, Chin-Tser Huang. 362-367 [doi]
- Distributed Multilevel Secure Data Stream ProcessingXing Xie, Indrakshi Ray, Waruna Ranasinghe, Philips A. Gilbert, Pramod Shashidhara, Anoop Yadav. 368-373 [doi]
- A Type-Theoretic Framework for Automated Synthesis of Workflows in Service-Oriented ComputingManuel Peralta, Supratik Mukhopadhyay, Ramesh Bharadwaj. 374-379 [doi]
- Timeout Reduction Method for Multistream Segmented Download Using PR-SCTPJunichi Funasaka, Jun Katsube, Kenji Ishida. 380-385 [doi]
- Leveraging Social Interactions to Suggest FriendsRoozbeh Nia, Fredrik Erlandsson, Henric Johnson, Shyhtsun Felix Wu. 386-391 [doi]
- Design and Implementation of a Cloud-Based Cross-Platform Mobile Health System with HTTP 2.0Young Choh, Kai Song, Yan Bai, Kyle Levy. 392-397 [doi]
- Privacy-Assured Similarity Query over Graph-Structured Data in Mobile CloudYingguang Zhang, Sen Su, Weifeng Chen, Yulong Wang, Peng Xu, Fangchun Yang. 398-403 [doi]
- A Framework for Enhancing Security and Privacy on Unmodified Mobile Operating SystemsBrian Krupp, Nigamanth Sridhar, Wenbing Zhao. 404-409 [doi]