Abstract is missing.
- Software Trustworthiness: Past, Present and FutureMitra Nami, Witold Suryn. 1-12 [doi]
- A New Measurement Method for Software Trustworthiness Based on Rough SetsYuyu Yuan, Qiang Han, Sun Qi. 13-19 [doi]
- Service Behavior Trustworthiness ManagementYuyu Yuan, Yangyang Zhang, Jing Liu. 20-25 [doi]
- Research on Identifying Method of Covert Channels in Database SystemYao Pang, Xiaoxiao Zhang, Luwei Sun, Weimin Ding. 26-33 [doi]
- Software Testing is Necessary But Not Sufficient for Software TrustworthinessMitra Nami, Witold Suryn. 34-44 [doi]
- A Measurement Model for Trustworthiness of Information System Based on Third-Party Testing DataJiaping Zuo, Pei Ren, Hao Kong. 45-51 [doi]
- Overview of Monitor Selection in Computer NetworksNafei Zhu, Jiaping Zuo, Yue Zhou, Wei Wang. 52-59 [doi]
- Verification of Requirement Analysis Method for System Based on ISO/IEC 9126 Six Quality CharacteristicsKazuhiro Esaki. 60-68 [doi]
- A Trustworthy Storage Framework on the CloudXiang Yao, Wenbin Yao. 69-77 [doi]
- Progress in Study of Encrypted Traffic ClassificationZigang Cao, Shoufeng Cao, Gang Xiong, Li Guo 0001. 78-86 [doi]
- Trustworthiness: From a Social Phenomenon to Internet TechnologyJørgen Bøegh. 87-93 [doi]
- Introduction of Quality Requirement and Evaluation Based on ISO/IEC SQuaRE Series of StandardKazuhiro Esaki, Motoei Azuma, Toshihiro Komiyama. 94-101 [doi]
- A Survey on the Security of Multihop Ad Hoc NetworkDe-yu Yuan, Tong Liu, Geng-yu Wei, Zhi-zhao Wang. 102-108 [doi]
- Outsourcing Cloud Data Privacy-Preserving Based on Over-EncryptionBing Rao, Zhigang Zhou, Hongli Zhang, Shuofei Tang, Renfu Yao. 109-116 [doi]
- The Measurement and Analysis of KAD NetworkDong Wang, Hui He, Jiantao Shi. 117-123 [doi]
- Encrypted Traffic Classification Based on an Improved Clustering AlgorithmMeng Zhang, Hongli Zhang, Bo Zhang, Gang Lu. 124-131 [doi]
- Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior AssociationGang Xiong, Wenting Huang, Yong Zhao, Ming Song, Zhenzhen Li, Li Guo. 132-139 [doi]
- Security and Trust Model for Data Disaster-Recovery Service on the CloudZhao Chen, Wenbin Yao, Cong Wang. 140-147 [doi]
- Towards Analyzing Traceability of Data Leakage by Malicious InsidersXiao Wang, Jinqiao Shi, Li Guo. 148-155 [doi]
- Dynamic Task Scheduling in Cloud Computing Based on Greedy StrategyLiang Ma, Yueming Lu, Fangwei Zhang, Songlin Sun. 156-162 [doi]
- A Multi-modal Clustering Method for Web VideosHaiqi Huang, Yueming Lu, Fangwei Zhang, Songlin Sun. 163-169 [doi]
- Incorporate Spatial Information into pLSA for Scene ClassificationFei Huang, Xiaojun Jing, Songlin Sun, Yueming Lu. 170-177 [doi]
- A Trust-Based Data Backup Method on the CloudMingtao Lei, Wenbin Yao, Cong Wang. 178-185 [doi]
- Active RFID-Based Indoor Localization Algorithm Using Virtual Reference through Bivariate Newton InterpolationChenggang Shao, Xiaojun Jing, Songlin Sun, Yueming Lu. 186-193 [doi]
- An Implementation of Trusted Remote Attestation Oriented the IaaSCloudChunwen Li, Xu Wu, Chuanyi Liu, Xiaqing Xie. 194-202 [doi]
- C-SURF: Colored Speeded Up Robust FeaturesJing Fu, Xiaojun Jing, Songlin Sun, Yueming Lu, Ying Wang. 203-210 [doi]
- Mining Explainable User Interests from Scalable User Behavior DataLi Jun, Zuo Xin-qiang, Zhou Meng-qi, Fan Gong-yuan, Li Lian-cun. 211-218 [doi]
- An Improved Design of the Trustworthiness Authentication Mechanism of IaaSXu Wu, Xiaqing Xie, Chuanyi Liu, Chunwen Li. 219-226 [doi]
- Research on Simulation and Real-Time Evaluation Method of IoT-Oriented Complex SystemJin-Cui Yang, Bin-Xing Fang, Yu-Yu Yuan, Meng-Xiao Zhai. 227-235 [doi]
- A New Manipulation Based Mobility Model for Vehicular Delay Tolerant NetworksTianle Zhang, Yuyu Yuan, Jørgen Bøegh, Xu Wu. 236-241 [doi]
- A Pervasive Technology Approach to Social TrustworthinessHongqi Wang, Zongwei Luo, Tianle Zhang, Yuyu Yuan, Xu Wu. 242-249 [doi]
- Policy-Based De-duplication in Secure Cloud StorageChuanyi Liu, Xiaojian Liu, Lei Wan. 250-262 [doi]
- A New Method Based on Fuzzy C-Means Algorithm for Search Results ClusteringFei Wang, Yueming Lu, Fangwei Zhang, Songlin Sun. 263-270 [doi]
- A Distance Adaptive Embedding Method in Dimension ReductionYanting Niu, Yueming Lu, Fangwei Zhang, Songlin Sun. 271-278 [doi]
- Joint Cognitive Access and Power Control in Two-Tie Femtocell NetworksXiaolong Zhao, Tiejun Lv, Yanhui Ma, Yueming Lu. 279-286 [doi]
- Based on Support Vector and Word Features New Word Discovery ResearchChengcheng Li, Yuanfang Xu. 287-294 [doi]
- A Flexible Framework for Representations of Entities in the Internet of ThingsHaining Yu, Hongli Zhang, Xingzhan Yu. 295-302 [doi]
- Community Detection Based on Robust Label Propagation AlgorithmBingying Xu, Zheng Liang, Yan Jia 0001, Bin Zhou 0004. 303-310 [doi]
- Clock Synchronization Algorithm for Distributed Video Surveillance Based on PTPLiu Xuehai, Tang Jin. 311-316 [doi]
- A Low-Complexity Vector Perturbation Precoding Approach Based on Reactive Tabu Search for Large Multiuser MIMO SystemsWei Ding, Tiejun Lv, Yueming Lu. 317-324 [doi]
- A PSO-Based Hierarchical Resource Scheduling Strategy on Cloud ComputingHongli Zhang, Panpan Li, Zhigang Zhou, Xiangzhan Yu. 325-332 [doi]
- Hiding Signatures in Variable NamesYinjie Su, Jiahui Liu, Dong Li. 333-340 [doi]
- Chinese New Words Detection Using Mutual InformationZheng Liang, Bingying Xu, Jie Zhao, Yan Jia 0001, Bin Zhou 0004. 341-348 [doi]
- An Efficient Parallel String Matching Algorithm Based on DFAYujian Fan, Hongli Zhang, Jiahui Liu, Dongliang Xu. 349-356 [doi]
- A Ciphertext Data Retrieval Method Based on Cloud StorageShuo Zheng, Siyang Wang, Cong Wang. 357-364 [doi]
- A Multi-phase k-anonymity Algorithm Based on Clustering TechniquesFei Liu, Yan Jia 0001, Weihong Han. 365-372 [doi]
- A P2P Reputation Model Based on P2P File-Sharing Behavioral CharacteristicsChao Xin, Hui Jun Han, Xiuqin Lin, Gengyu Wei. 373-379 [doi]
- Unobservable Rendezvous Negotiation in P2P NetworksFanwen Xu, Qingfeng Tan, Jinqiao Shi, Li Guo. 380-387 [doi]
- A Hierarchical Method for Clustering Binary Text ImageYiguo Pu, Jinqiao Shi, Li Guo. 388-396 [doi]
- Search Results Evaluation Based on User BehaviorJinxiu Yu, Yueming Lu, Songlin Sun, Fangwei Zhang. 397-403 [doi]
- Classification Research on SSL Encrypted ApplicationPeipei Fu, Li Guo, Gang Xiong, Jiao Meng. 404-411 [doi]
- S-URL Flux: A Novel C&C Protocol for Mobile BotnetsShuai Wang, Xiang Cui, Peng Liao, Dan Li. 412-419 [doi]
- An Efficient Ellipse-Shaped Blobs Detection Algorithm for Breaking Facebook CAPTCHAPeipeng Liu, Jinqiao Shi, Lihong Wang, Li Guo. 420-428 [doi]
- Security and Cost Analyses of DNSSEC ProtocolYao Yao, Longtao He, Gang Xiong. 429-435 [doi]
- An Automatic Approach to Detect Anti-debugging in Malware AnalysisPeidai Xie, Xicheng Lu, Yongjun Wang, Jinshu Su, Meijian Li. 436-442 [doi]
- OpenVPN Traffic Identification Using Traffic Fingerprints and Statistical CharacteristicsYi Pang, Shuyuan Jin, Shicong Li, Jilei Li, Hao Ren. 443-449 [doi]
- An Intent-Driven Masquerader Detection Framework Based on Data FusionXiaojun Chen 0004, Jinqiao Shi, Yiguo Pu, Haoliang Zhang. 450-457 [doi]
- An Integration of Several Different Data Flow Analysis TechniquesYuchen Xing, Hanfei Wang, Jianhua Zhao. 458-465 [doi]
- Specifying and Detecting Behavioral Changes in Source Code Using Abstract Syntax Tree DifferencingYuankui Li, Linzhang Wang. 466-473 [doi]
- Timing Aspects Construction Using UML-MARTE ProfileQingqing Sun, Xiaopu Huang, Jiangwei Li, Tian Zhang 0001. 474-481 [doi]
- An Overtime-Detection Model-Checking Technique for Interrupt Processing SystemsXiaoyu Zhou, Jianhua Zhao. 482-489 [doi]
- MDE-Based Verification of SysML State Machine Diagram by UPPAALXiaopu Huang, Qingqing Sun, Jiangwei Li, Tian Zhang 0001. 490-497 [doi]
- CppIns: A Source Query Language for InstrumentationYing He, Yongjing Tao, Tian Zhang 0001. 498-505 [doi]
- An UML Model Query Method Based on Structure Pattern MatchingXuelin Zhang, Huajie Chen, Tian Zhang 0001. 506-513 [doi]
- A Lightweight Type Enforcement Access Control Approach with Role Based AuthorizationYan Ding, Hongyi Fu, Lifeng Wei, Lianyue He, Huadong Dai, Qingbo Wu. 514-521 [doi]
- Composition of AADL Components by Transformation to Interface AutomataJiangwei Li, Jizhou Zhao, Qingqing Sun, Xiaopu Huang, Yan Zhang, Tian Zhang 0001. 522-529 [doi]
- Finding δ-Closure Property of BitTorrent System and Applications Based on This PropertyKun Wang, Ying Sha, Jian-long Tan, Li Guo, Yang Li. 530-538 [doi]
- A Tool to Construct One Comprehensive Legal Environment for Behavioral Incompatible ComponentsJizhou Zhao, Jiangwei Li, Yan Zhang, Tian Zhang 0001. 539-546 [doi]
- Research of Security Relationship Based on Social NetworksYang Li, Xiaoyan Wang, Ying Sha, Jian-long Tan. 547-554 [doi]
- Vulnerability Evaluating Based on Attack GraphChunlu Wang, Yu Bao, Xuesen Liang, Tianle Zhang. 555-563 [doi]
- A Dynamic Strategy to Cache Out-of-Sequence Packet in DPI SystemQingyun Liu, Wenzhong Feng, Qiong Dai. 564-571 [doi]
- Speeding Up Double-Array Trie Construction for String MatchingShuai Niu, Yanbing Liu, Xinbo Song. 572-579 [doi]
- Modeling of Hierarchical Index System for Network Operation SecurityYongzheng Zhang, Xiaochun Yun. 580-590 [doi]
- An Evaluation Framework of Coverage-Based Fault Localization for Object-Oriented ProgramsQing Xu, Yu Pei 0001, Linzhang Wang. 591-597 [doi]
- Research of New Words Identification in Social Network for Monitoring Public OpinionXiaoyan Wang, Kai Xu, Ying Sha, Jian-long Tan, Li Guo. 598-603 [doi]
- A Novel Dynamic Self-adaptive Framework for Network Security EvaluationJinyu Wu, Lihua Yin, Binxing Fang. 604-612 [doi]
- Wireless Sensor Network MAC Protocol Used in the City FireXiaoyan Cui, Xiaoshuang Chen, Haitao Zhang, Shizhuo Zheng. 613-620 [doi]
- The Application of Robot Localization and Navigation Based on WSN in the Disaster ReliefXiaoyan Cui, Xiaoshuang Chen, Wei Shi, Yi Zhang. 621-628 [doi]
- Comparison and Performance Analysis of Join Approach in MapReduceFuhui Wu, Qingbo Wu, Yusong Tan. 629-636 [doi]
- Analysis of Public Sentiment Based on SMS ContentZhilei Wang, Lidong Zhai, Yongqiang Ma, Yue Li. 637-643 [doi]
- Control Method of Twitter- and SMS-Based Mobile BotnetYue Li, Lidong Zhai, Zhilei Wang, Yunlong Ren. 644-650 [doi]
- A Cache Management Strategy for Transparent Computing Storage SystemYuan Gao, Yaoxue Zhang, Yuezhi Zhou. 651-658 [doi]
- Network Security Situation Prediction Based on BP and RBF Neural NetworkYaxing Zhang, Shuyuan Jin, Xiang Cui, Xi Yin 0003, Yi Pang. 659-665 [doi]
- Research on Redundant Channel Model Based on Spatial Correlation in IOTFangjiao Zhang, Wei Guo, Jincui Yang, Fangfang Yuan, Lidong Zhai. 666-672 [doi]
- Design of a Trusted File System Based on HadoopSongchang Jin, Shuqiang Yang, Xiang Zhu, Hong Yin. 673-680 [doi]
- Architecting Dependable Many-Core Processors Using Core-Level Dynamic RedundancyWentao Jia, Chunyuan Zhang, Jian Fu, Rui Li. 681-688 [doi]
- Study on Transformed Keywords Identification in Spam FilteringDapeng Xiong, Zhang Yan, Aiping Li. 689-697 [doi]
- Preliminary Study of Enhanced Collaborative Information Extracting and Sharing SystemMingfei Wu, Yi Han, Bin Zhou 0002, Aiping Li. 698-705 [doi]
- A Compatible and Graphical Modeling Approach for Earth System ModelTaiping Guo, Zhongzhi Luan. 706-713 [doi]
- Who Can Haul the ANDON-CORD in the Software Development ProcessLiu Yinglian, Jørgen Bøegh, Sun Qi. 714-720 [doi]
- Research and Implement of Security Situation Awareness System YH-SSASWeihong Han, Qingguang Wang, Yan Jia 0001. 721-729 [doi]
- A Reliable Query Scheme for Outsourced Data in CloudJunchao Wu, Panpan Li, Hongli Zhang, Binsheng Chu. 730-736 [doi]