


default search action
3rd CSCloud 2016: Beijing, China
- Meikang Qiu, Lixin Tao, Jianwei Niu:

3rd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2016, Beijing, China, June 25-27, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-0946-6
CSCloud 1
- Thierry Mbah Mbelli, Barry Dwolatzky:

Cyber Security, a Threat to Cyber Banking in South Africa: An Approach to Network and Application Security. 1-6 - Youssef Gahi

, Junaid Israr, Mouhcine Guennoun:
Wormhole Detection in Secured BGP Networks. 7-11 - Yuqi Fan, Yongfeng Xia, Yuheng Liu, Xiaohui Yuan

:
Electricity Cost Management for Cloud Data Centers under Diverse Delay Constraints. 12-19 - Qiumao Ma, Jinsheng Zhang, Yang Peng, Wensheng Zhang, Daji Qiao:

SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage. 20-25
CSCloud 2
- Yu Zhang

, Binbin Ge, Xiang Li, Bin Shi, Bo Li:
Controlling a Car Through OBD Injection. 26-29 - Yukun Zhang, Bo Li:

A Novel Software Defined Networking Framework for Cloud Environments. 30-35 - Li Lin, Jian Hu, Xinya Mao, Jian-biao Zhang:

Saphena: An Approach for Analyzing Similarity of Heterogeneous Policies in Cloud Environment. 36-41 - Bo Li, Peng Liu, Li Lin:

A Cluster-Based Intrusion Detection Framework for Monitoring the Traffic of Cloud Environments. 42-45
CSCloud 3
- Jianjun Li, Wei Li, Ming Li:

Towards an Out-of-the-Box Cloud Application Monitoring Framework. 46-49 - Zhe Wang, Jin Zeng, Tao Lv, Bin Shi, Bo Li:

CloudAuditor: A Cloud Auditing Framework Based on Nested Virtualization. 50-53 - Chandrima Dadi, Ping Yi, Zongming Fei, Hui Lu:

A New Block-Based Data Distribution Mechanism in Cloud Computing. 54-59 - Longbin Chen, Li-Chiou Chen, Nader Nassar, Meikang Qiu:

An Analysis of Server-Side Design for Seed-Based Mobile Authentication. 60-65 - Martin Konan, Wenyong Wang, Brighter Agyemang

:
Efran (O): "Efficient Scalar Homomorphic Scheme on MapReduce for Data Privacy Preserving". 66-74
CSCloud 4
- Boyu Hou, Kai Qian, Lei Li, Yong Shi, Lixin Tao, Jigang Liu:

MongoDB NoSQL Injection Analysis and Detection. 75-78 - Jian Su, Yu Huang, Guangxian Lv, Haitao Liu, Peng Jin:

A Framework Research of Power Grid Knowledge Recommendation and Situation Reasoning Based on Cloud Computing and CEP. 79-83 - Ady Wahyudi Paundu

, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Sequence-Based Analysis of Static Probe Instrumentation Data for a VMM-Based Anomaly Detection System. 84-94 - Mounib Khanafer

, Youssef Gahi
, Mouhcine Guennoun, Hussein T. Mouftah:
A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor Networks. 95-101 - Wei Yang, Qin Wang, Yadong Wan, Jie He:

Security Vulnerabilities and Countermeasures for Time Synchronization in IEEE802.15.4e Networks. 102-107
CSCloud 5
- Mengxiang Guan, Jiaxing Song, Weidong Liu:

A Threshold Multi-server Protocol for Password-Based Authentication. 108-118 - Laurent Bobelin, Patrick Martineau, Di Zhao, Haiwu He:

Shortest Processing Time First Algorithm for Hadoop. 119-123 - Junjie Peng, Jinbao Chen, Shuai Kong, Danxu Liu, Meikang Qiu:

Resource Optimization Strategy for CPU Intensive Applications in Cloud Computing Environment. 124-128 - Ziqi Wang, Haihui Zhao:

Empirical Study of Using Big Data for Business Process Improvement at Private Manufacturing Firm in Cloud Computing. 129-135 - Jiawen Kang

, Rong Yu, Xumin Huang, Sabita Maharjan, Yan Zhang:
On-demand Pseudonym Systems in Geo-Distributed Mobile Cloud Computing. 136-141
CSCloud 6
- Zhiping Peng, Delong Cui

, Yuanjia Ma, Jianbin Xiong, Bo Xu, Weiwei Lin:
A Reinforcement Learning-Based Mixed Job Scheduler Scheme for Cloud Computing under SLA Constraint. 142-147 - Chen Xiao, Lifeng Wang, Zhu Jie, Tiemeng Chen:

A Multi-level Intelligent Selective Encryption Control Model for Multimedia Big Data Security in Sensing System with Resource Constraints. 148-153 - Ying Liu:

A Consolidation Strategy Supporting Resources Oversubscription in Cloud Computing. 154-162 - Zhiping Peng, Delong Cui

, Yuanjia Ma, Jianbin Xiong, Bo Xu, Weiwei Lin:
R-Learning and Gaussian Process Regression Algorithm for Cloud Job Access Control. 163-166 - Kamile Nur Sevis, Ensar Seker

:
Survey on Data Integrity in Cloud. 167-171
CSCloud 7
- Hongliang Liang, Daijie Zhang, Xiaoxiao Pei, Xiaodong Jia, Guangyuan Li, Jiuyun Xu:

A Correctness Verification Method for C Programs Based on VCC. 172-177 - Abdullahi Arabo:

Mobile App Collusions and Its Cyber Security Implications. 178-183 - Wei Ding, Jose Arriaga:

A Universal Algorithm to Secure Stolen Mobile Devices Using Wi-Fi in Indoors Environments. 184-189 - Leila Fetjah

, Karim Benzidane
, Hassan El Alloussi, Othman El Warrak, Said Jai-Andaloussi
, Abderrahim Sekkaki:
Toward a Big Data Architecture for Security Events Analytic. 190-197
CSCloud 8
- Keke Gai

, Meikang Qiu, Hui Zhao, Meiqin Liu:
Energy-Aware Optimal Task Assignment for Mobile Heterogeneous Embedded Systems in Cloud Computing. 198-203 - Md Liakat Ali, Kutub Thakur, Charles C. Tappert, Meikang Qiu:

Keystroke Biometric User Verification Using Hidden Markov Model. 204-209 - Kutub Thakur, Sandra Kopecky

, Moath Nuseir, Md Liakat Ali, Meikang Qiu:
An Analysis of Information Security Event Managers. 210-215 - Wan Sheng:

Preparation of Graphene and Its Performance Analysis. 216-219 - Lifan Xu, Dong Ping Zhang, Marco A. Alvarez, Jose Andre Morales, Xudong Ma, John Cavazos:

Dynamic Android Malware Classification Using Graph-Based Representations. 220-231
SSC 1
- Sunanda Bose

, Nandini Mukherjee:
SensIaas: A Sensor-Cloud Infrastructure with Sensor Virtualization. 232-239 - Claude Asamoah, Lixin Tao, Keke Gai

, Ning Jiang:
Powering Filtration Process of Cyber Security Ecosystem Using Knowledge Graph. 240-246 - Dongdong Ye, Maoqiang Wu, Shensheng Tang, Rong Yu:

Scalable Fog Computing with Service Offloading in Bus Networks. 247-251 - Zhe Wang, Jin Zeng, Tao Lv, Bin Shi, Bo Li:

A Remote Backup Approach for Virtual Machine Images. 252-255 - Liyun Qian, Zhitang Li, Pei Zhou, Jian Chen:

An Improved Matrix Encoding Steganography Algorithm Based on H.264 Video. 256-260
SSC 2
- Maria Sette

, Lixin Tao, Keke Gai
, Ning Jiang:
A Semantic Approach to Intelligent and Personal Tutoring System. 261-266 - Gilbert Alipui, Lixin Tao, Keke Gai

, Ning Jiang:
Reducing Complexity of Diagnostic Message Pattern Specification and Recognition on In-Bound Data Using Semantic Techniques. 267-272 - Keke Gai

, Meikang Qiu, Hui Zhao, Jian Xiong:
Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing. 273-278 - R. J. DeStefano, Lixin Tao, Keke Gai

:
Improving Data Governance in Large Organizations through Ontology and Linked Data. 279-284
SSC 3
- Saravanan Jayaraman, Lixin Tao, Keke Gai

, Ning Jiang:
Drug Side Effects Data Representation and Full Spectrum Inferencing Using Knowledge Graphs in Intelligent Telehealth. 289-294 - Sam Adam Elnagdy, Meikang Qiu, Keke Gai

:
Understanding Taxonomy of Cyber Risks for Cybersecurity Insurance of Financial Industry in Cloud Computing. 295-300 - Sam Adam Elnagdy, Meikang Qiu, Keke Gai

:
Cyber Incident Classifications Using Ontology-Based Knowledge Representation for Cybersecurity Insurance in Financial Industry. 301-306

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














