


default search action
2nd CSCloud 2015: New York, NY, USA
- IEEE 2nd International Conference on Cyber Security and Cloud Computing, CSCloud 2015, New York, NY, USA, November 3-5, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-9300-3

- Keke Gai

, Zhihua Du, Meikang Qiu, Hui Zhao:
Efficiency-Aware Workload Optimizations of Heterogeneous Cloud Computing for Capacity Planning in Financial Industry. 1-6 - Deepak K. Tosh

, Shamik Sengupta, Sankar Mukhopadhyay, Charles A. Kamhoua, Kevin A. Kwiat:
Game Theoretic Modeling to Enforce Security Information Sharing among Firms. 7-12 - Ayesha M. Talha, Ibrahim Kamel, Zaher Al Aghbari:

Enhancing Confidentiality and Privacy of Outsourced Spatial Data. 13-18 - Longbin Chen, Yucong Duan, Meikang Qiu, Jian Xiong, Keke Gai

:
Adaptive Resource Allocation Optimization in Heterogeneous Mobile Cloud Systems. 19-24 - Travis Brummett, Pezhman Sheinidashtegol, Debadrita Sarkar, Michael Galloway:

Performance Metrics of Local Cloud Computing Architectures. 25-30 - Syed Rizvi, Abdul Razaque

, Katie Cover:
Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud Environment. 31-36 - Yong Jin, Hikaru Ichise, Katsuyoshi Iida

:
Design of Detecting Botnet Communication by Monitoring Direct Outbound DNS Queries. 37-41 - Md Liakat Ali, Kutub Thakur, John V. Monaco, Meikang Qiu:

An Approach to Minimize Crossings in Phylogenetic Trees. 42-47 - Kurt Rohloff

:
Privacy-Preserving Data Exfiltration Monitoring Using Homomorphic Encryption. 48-53 - Taimur Al Said, Omer F. Rana

:
Implementing Migration-Aware Virtual Machines. 54-61 - Pandi Vijayakumar

, Maria Azees
, L. Jegatha Deborah
:
CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks. 62-67 - Haruhisa Kosuge, Hidema Tanaka, Keisuke Iwai, Takakazu Kurokawa:

Integral Attack on Reduced-Round Rectangle. 68-73 - Keke Gai

, Meikang Qiu, Hui Zhao, Wenyun Dai:
Anti-Counterfeit Scheme Using Monte Carlo Simulation for E-commerce in Cloud Systems. 74-79 - Salam Ismaeel

, Ali Miri:
Using ELM Techniques to Predict Data Centre VM Requests. 80-86 - Jia Yang, Cai Fu, Deliang Xu, Lansheng Han, Xiao-Yang Liu:

Search Engine: A Hidden Power for Virus Propagation in Community Networks. 87-92 - Fanbiao Bao, Baoshan Huang, Bing Li, Yonghe Jiao:

The Software Design of Car Low-Speed Intelligent Braking System. 93-97 - Keke Gai

, Meikang Qiu, Saravanan Jayaraman, Lixin Tao:
Ontology-Based Knowledge Representation for Secure Self-Diagnosis in Patient-Centered Teleheath with Cloud Systems. 98-103 - Mohd Anwar, Ashiq Imran:

Access Control for Multi-tenancy in Cloud-Based Health Information Systems. 104-110 - Kai Fan, Nana Huang, Yue Wang, Hui Li, Yintang Yang:

Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption. 111-114 - Yuanming Zhang, Kuan Ni, Jiawei Lu, Jun Xu, Gang Xiao:

DOGCP: A Domain-Oriented Government Cloud Platform Based on PaaS. 115-120 - Longbin Chen, Meikang Qiu, Jian Xiong:

An SDN-Based Fabric for Flexible Data-Center Networks. 121-126 - Mengmeng Wang, Jianwei Liu, Jie Chen, Xiao Liu, Jian Mao:

PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking. 127-132 - Fei Gu, Jianwei Niu

, Zhenxue He, Meikang Qiu, Cuijiao Fu:
CLMRS: Designing Cross-LAN Media Resources Sharing Based on DLNA. 133-140 - Ihab Darwish, Obinna Igbe

, Orhan Celebi, Tarek N. Saadawi, Joseph Soryal:
Smart Grid DNP3 Vulnerability Analysis and Experimentation. 141-147 - Hongmu Han, Ruixuan Li, Jinwei Hu, Meikang Qiu:

Context Awareness through Reasoning on Private Analysis for Android Application. 148-156 - Andrea Andreoli, Luca Ferretti

, Mirco Marchetti
, Michele Colajanni
:
Enforcing Correct Behavior without Trust in Cloud Key-Value Databases. 157-164 - Dan Fleck

, Fengwei Zhang, Sharath Hiremagalore, Stephen Reese, Liam McGhee:
Class-Chord: Efficient Messages to Classes of Nodes in Chord. 165-174 - Hui Zhao, Meikang Qiu, Keke Gai

, Jie Li, Xin He:
Maintainable Mobile Model Using Pre-Cache Technology for High Performance Android System. 175-180 - Ahmet Ilhan Aysan, Sevil Sen

:
"Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications. 181-186 - Haibin Zheng, Jing Qin

, Jiankun Hu
, Qianhong Wu:
Threshold Attribute-Based Signcryption in Standard Model. 187-193 - Guangquan Xu, Bin Liu, Yuanyuan Ren, Runhe Huang, Gaoxu Zhang, Zhiyong Feng, Xiaohong Li:

Towards Trustworthy Participants in Social Participatory Networks. 194-199 - Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong:

Detection and Identification of Android Malware Based on Information Flow Monitoring. 200-203 - Jiaxu Zhao, Zhide Chen, YaLi Zeng:

Intelligent Traffic Light Model Based on Grey-Markov Model and Improved Ant Colony Optimization for Dynamic Route Guidance. 204-212 - Xiang Tao, Yongxin Zhu, Yishu Mao, Han Song, Mengyun Liu, Xinyi Liu, Weiguang Sheng, Weiwei Shi:

Designing ARINC653 Partition Constrained Scheduling for Secure Real Time Embedded Avionics. 213-217 - Xiao Liu, Meikang Qiu, Xiaodong Wang, Weiran Liu, Kaiquan Cai:

Energy Optimization of Air-Based Information Network with Guaranteed Security Protection. 218-223 - Nezer Jacob Zaidenberg

, Eviatar Khen:
Detecting Kernel Vulnerabilities During the Development Phase. 224-230 - Yang Yang, Hui Xu, Yanan Liu, Zhongwei Li, Weishan Zhang

, Xin Liu:
Feature Analysis of Important Nodes in Microblog. 231-236 - Xuefei Wang, Hengtai Ma, Ke Yang, Hongliang Liang:

An Uneven Distributed System for Dynamic Taint Analysis Framework. 237-240 - Hongliang Liang, Dongyang Wu, Jiuyun Xu, Hengtai Ma:

Survey on Privacy Protection of Android Devices. 241-246 - Emma Osborn

, Andrew Simpson
:
Small-Scale Cyber Security. 247-252 - Hoi Ting Poon, Ali Miri:

A Low Storage Phase Search Scheme Based on Bloom Filters for Encrypted Cloud Services. 253-259 - Yoshiaki Shiraishi, Masami Mohri, Hitoshi Miyazaki, Masakatu Morii:

A Three-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme for Line Topology. 260-265 - Osama M. Ben Omran, Brajendra Panda:

Efficiently Managing Encrypted Data in Cloud Databases. 266-271 - Hevel Jean-Baptiste, Meikang Qiu, Keke Gai

, Lixin Tao:
Meta Meta-Analytics for Risk Forecast Using Big Data Meta-Regression in Financial Industry. 272-277 - Ari Butowsky, Keke Gai

, Michael Coakley, Meikang Qiu, Charles C. Tappert:
City of White Plains Parking App: Case Study of a Smart City Web Application. 278-282 - Yu Huang, Xuanzheng Hu, Guangxian Lv, Renfan Yang:

A Simulation Modeling Method Based on Petri Net. 283-288 - Simin Zhang, Bo Li, Jianxin Li, Mingming Zhang, Yang Chen:

A Novel Anomaly Detection Approach for Mitigating Web-Based Attacks Against Clouds. 289-294 - Thu Yein Win, Huaglory Tianfield

, Quentin Mair:
Detection of Malware and Kernel-Level Rootkits in Cloud Computing Environments. 295-300 - Hevel Jean-Baptiste, Lixin Tao, Meikang Qiu, Keke Gai

:
Understanding Model Risk Management - Model Rationalization in Financial Industry. 301-306 - Kutub Thakur, Meikang Qiu, Keke Gai

, Md Liakat Ali:
An Investigation on Cyber Security Threats and Security Models. 307-311 - Hevel Jean-Baptiste, Meikang Qiu, Keke Gai

, Lixin Tao:
Model Risk Management Systems-Back-End, Middleware, Front-End and Analytics. 312-316 - Wenqing Zhang, Shijie Zhou, Jiaqing Luo, Hongrong Cheng, Yongjian Liao:

A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners. 317-322 - Baolei Cheng, Jianxi Fan, Dajin Wang, Jiwen Yang:

A Reliable Broadcasting Algorithm in Locally Twisted Cubes. 323-328 - Salam Ismaeel

, Ali Miri, Alireza Sadeghian, Dharmendra Chourishi:
An Extreme Learning Machine (ELM) Predictor for Electric Arc Furnaces' v-i Characteristics. 329-334 - Michael Kiperberg, Amit Resh, Nezer Jacob Zaidenberg

:
Remote Attestation of Software and Execution-Environment in Modern Machines. 335-341 - Philip J. Riesch, Xiaojiang Du, Haibin Ling, Michael J. Mayhew:

Face Recognition with Environment Tolerance on a Mobile Device. 342-348 - Waqas Haider, Jiankun Hu

, Xinghuo Yu
, Yi Xie:
Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems. 349-355 - Yang Yang, Natalija Vlajic, Uyen Trang Nguyen:

Next Generation of Impersonator Bots: Mimicking Human Browsing on Previously Unvisited Sites. 356-361 - William Augusto Rodrigues de Souza, Allan Tomlinson:

SMM-Based Hypervisor Integrity Measurement. 362-367 - Fei Xu, Sheng Han, Ying Wang, Jian Zhang, Yong Li:

QRToken: Unifying Authentication Framework to Protect User Online Identity. 368-373 - Bharat S. Rawal, Ramesh K. Karne, Quiang Duan:

Split-System: The New Frontier of Cloud Computing. 374-381 - Charles A. Kamhoua, Andrew P. Martin, Deepak K. Tosh

, Kevin A. Kwiat, Chad Heitzenrater, Shamik Sengupta:
Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach. 382-389 - David Jaeger

, Martin Ussath, Feng Cheng, Christoph Meinel:
Multi-step Attack Pattern Detection on Normalized Event Logs. 390-398 - Harsha Kumara Kalutarage

, Chonho Lee, Siraj Ahmed Shaikh
, Francis Bu-Sung Lee:
Towards an Early Warning System for Network Attacks Using Bayesian Inference. 399-404 - Jedidiah Yanez-Sierra

, Arturo Diaz-Perez, Victor Sosa-Sosa
, José Luis González
:
Towards Secure and Dependable Cloud Storage Based on User-Defined Workflows. 405-410 - Rui Tao, Jianwei Liu, Hang Su, Yang Sun, Xiao Liu:

Combination in Advance Batch Multi-exponentiation on Elliptic Curve. 411-416 - Zhi Qiao

, Shuwen Liang, Hai Jiang, Song Fu
:
MR-Graph: A Customizable GPU MapReduce. 417-422 - Jeffrey Bickford, Paul Giura:

Safe Internet Browsing Using a Transparent Virtual Browser. 423-432 - Suqi Zhang, Yongfen Dong, Jun Yin, Jingjin Guo:

Improved Ant Colony Algorithm for Finding the Maximum Clique in Social Network. 433-438 - Haruhisa Kosuge, Hidema Tanaka, Keisuke Iwai, Takakazu Kurokawa:

Computational Security Evaluation of Light-Weight Block Cipher Against Integral Attack by GPGPU. 439-444 - Ibrahim Waziri:

Website Forgery: Understanding Phishing Attacks and Nontechnical Countermeasures. 445-450 - Thaier Hayajneh

, Tao Zhang, Bassam Jamil Mohd:
Security Issues in WSNs with Cooperative Communication. 451-456 - Wenbo Zhu, C. Murray Woodside:

Tunable Performance and Consistency Tradeoffs for Geographically Replicated Cloud Services (COLOR). 457-463 - Wenjia Li, Jigang Ge, Guqian Dai:

Detecting Malware for Android Platform: An SVM-Based Approach. 464-469 - Salam Ismaeel

, Ali Miri, Dharmendra Chourishi, S. M. Reza Dibaj:
Open Source Cloud Management Platforms: A Review. 470-475 - Ming Jiang, Ai He, Kuangyu Wang, Zhengyi Le:

Two-Way Graphic Password for Mobile User Authentication. 476-481 - Joseph Funsho Omonaiye, V. V. Madhavi Lalitha, Habib Ullah Khan

, Sheila D. Fournier-Bonilla, Rajvir Singh:
Ability and Hurdle to Provide Banking Online Services: A Case Study of Banking Employees in Nigeria. 482-487 - S. Sree Vivek, Rajkumar Ramasamy:

Forward Secure On-device Encryption Scheme Withstanding Cold Boot Attack. 488-493 - Khagesh Patel, Ishaan Dube, Lixin Tao, Ning Jiang:

Extending OWL to Support Custom Relations. 494-499 - Jiageng Chen

, Atsuko Miyaji
, Chunhua Su, Jesen Teh
:
Improved Differential Characteristic Searching Methods. 500-508 - Quentin Mayo, Renée C. Bryce, Ram Dantu:

PhD Forum: A System Identification Approach to Monitoring Network Traffic Security. 509-511 - Zaid Al-Ali, Basheer Al-Duwairi, Ahmad T. Al-Hammouri

:
Handling System Overload Resulting from DDoS Attacks and Flash Crowd Events. 512 - Michel Edkrantz, Staffan Truvé, Alan Said

:
Predicting Vulnerability Exploits in the Wild. 513-514 - Tianyu Chen, Yuan Ma, Jingqiang Lin, Zhan Wang, Jiwu Jing:

An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test. 515-517 - Lujin You, Junjie Peng, Ming Chen, Meikang Qiu:

A Strategy to Improve the Efficiency of I/O Intensive Application in Cloud Computing Environment. 518-523 - Jinbao Chen, Junjie Peng, Xiaofei Zhi, Meikang Qiu:

Research on Application Classification Method in Cloud Computing Environment. 524-529 - Huiqiang Wang, Shichen Zou, Junyu Lin, Guangsheng Feng, Hongwu Lv:

A Dependable Service Path Searching Method in Distributed Virtualized Environment Using Adaptive Bonus-Penalty Micro-Canonical Annealing. 530-539 - Zhouwang Fu, Tao Song

, Sheng Wang, Fuzong Wang, Zhengwei Qi:
Seagull - A Real-Time Coflow Scheduling System. 540-545

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














