Search dblp for Publications

export results for "stream:streams/conf/isctcs:"

 download as .bib file

@proceedings{DBLP:conf/isctcs/2014,
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47401-3},
  doi          = {10.1007/978-3-662-47401-3},
  isbn         = {978-3-662-47400-6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/BaiJLT14,
  author       = {Xu Bai and
                  Lei Jiang and
                  Xinxing Liu and
                  Jianlong Tan},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {{RSA} Encryption/Decryption Implementation Based on Zedboard},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {114--121},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_15},
  doi          = {10.1007/978-3-662-47401-3\_15},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/BaiJLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/BaiXZ14,
  author       = {Quan Bai and
                  Gang Xiong and
                  Yong Zhao},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Find Behaviors of Network Evasion and Protocol Obfuscation Using Traffic
                  Measurement},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {342--349},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_45},
  doi          = {10.1007/978-3-662-47401-3\_45},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/BaiXZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/Boegh14,
  author       = {J{\o}rgen B{\o}egh},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Understanding Human Goal Setting as a Means for Supporting Goal Oriented
                  Requirements Engineering},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {253--259},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_33},
  doi          = {10.1007/978-3-662-47401-3\_33},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/Boegh14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ChenD14,
  author       = {Heng Chen and
                  Xiaoshe Dong},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Web-Based Heatmap of Physical Machines in Cloud Computing},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {107--113},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_14},
  doi          = {10.1007/978-3-662-47401-3\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ChenD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ChenPCSY14,
  author       = {Yan Chen and
                  Yiguo Pu and
                  Xiaojun Chen and
                  Jinqiao Shi and
                  Xiaojie Yu},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {{CAS:} Content Attribution System for Network Forensics},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {129--136},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_17},
  doi          = {10.1007/978-3-662-47401-3\_17},
  timestamp    = {Sun, 01 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ChenPCSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/CuiLYY14,
  author       = {Dong Cui and
                  Chuanyi Liu and
                  Meiqi Yang and
                  Jincui Yang},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Sentinel: In Case of the Untrustworthy Behaviors Inside the Clouds},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {99--106},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_13},
  doi          = {10.1007/978-3-662-47401-3\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/CuiLYY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/DingZWPLQ14,
  author       = {Chao Ding and
                  Mingxia Zeng and
                  Kui Wang and
                  Polo Pei and
                  Zhongzhi Luan and
                  Depei Qian},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {An Active Approach for Automatic Rule Discovery in Rule-Based Monitoring
                  Systems},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {304--310},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_40},
  doi          = {10.1007/978-3-662-47401-3\_40},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/DingZWPLQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/DuY14,
  author       = {Xuefeng Du and
                  Xiaodong Yan},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Tracking and Analysis of Hot Words and Posts for University Campus},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {137--143},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_18},
  doi          = {10.1007/978-3-662-47401-3\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/DuY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/FengWZHG14,
  author       = {Weiwei Feng and
                  Peng Wang and
                  Chuan Zhou and
                  Yue Hu and
                  Li Guo},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Nonparametric Topic-Aware Sparsification of Influence Networks},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {83--90},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_11},
  doi          = {10.1007/978-3-662-47401-3\_11},
  timestamp    = {Wed, 05 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/FengWZHG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/GaoG14,
  author       = {Huimin Gao and
                  Zeng Guang},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {The Optimization Design of High {Q} Microwave Photonic Filters Based
                  on Cascade Fiber Bragg Gratings},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {267--273},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_35},
  doi          = {10.1007/978-3-662-47401-3\_35},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/GaoG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/GuangLMY14,
  author       = {Zeng Guang and
                  Yao Lin and
                  Zhao Ming and
                  Ma Yilan},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {The Improvement and Implementation of iSLIP Algorithm Based on {FPGA}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {260--266},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_34},
  doi          = {10.1007/978-3-662-47401-3\_34},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/GuangLMY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/HeJ14,
  author       = {Xin He and
                  Huiyun Jing},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Security Risk Assessment of Rich Communication Services Over {LTE}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {122--128},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_16},
  doi          = {10.1007/978-3-662-47401-3\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/HeJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/HeJYC14,
  author       = {Xiaowei He and
                  Shuyuan Jin and
                  Yunxue Yang and
                  Huiqiang Chi},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {DDoS Detection Based on Second-Order Features and Machine Learning},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {197--205},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_26},
  doi          = {10.1007/978-3-662-47401-3\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/HeJYC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/HuangY14,
  author       = {Hongjie Huang and
                  Shuqiang Yang},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {A Method of Evaluating Distributed Storage System Reliability},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {189--196},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_25},
  doi          = {10.1007/978-3-662-47401-3\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/HuangY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/JiaLM14,
  author       = {Bin Jia and
                  Zhaowen Lin and
                  Yan Ma},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Advanced Persistent Threat Detection Method Research Based on Relevant
                  Algorithms to Artificial Immune System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {221--228},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_29},
  doi          = {10.1007/978-3-662-47401-3\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/JiaLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/JiangQL14,
  author       = {Xinmin Jiang and
                  Lirong Qiu and
                  Yeqing Li},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {A Tibetan Word Sense Disambiguation Method Based on HowNet and Chinese-Tibetan
                  Parallel Corpora},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {152--159},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_20},
  doi          = {10.1007/978-3-662-47401-3\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/JiangQL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/JieZQ14,
  author       = {Yuan Jie and
                  Liu Zhishuai and
                  Xiaoyu Qiu},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Community Detection in Complex Networks: Algorithms and Analysis},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {238--244},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_31},
  doi          = {10.1007/978-3-662-47401-3\_31},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/JieZQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiC14,
  author       = {Wei Li and
                  Feng Cao},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Trusted Cloud Service Certification and Evaluation},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {175--182},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_23},
  doi          = {10.1007/978-3-662-47401-3\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiLLZ14,
  author       = {Linghan Li and
                  Yonghua Li and
                  Jiaru Lin and
                  Tianle Zhang},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Enhanced AllJoyn Network with Centralized Management},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {183--188},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_24},
  doi          = {10.1007/978-3-662-47401-3\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiLLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiLZ14,
  author       = {Jing Li and
                  Yueming Lu and
                  Xi Zhang},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Extracting News Information Based on Webpage Segmentation and Parsing
                  {DOM} Tree Reversely},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {48--55},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_7},
  doi          = {10.1007/978-3-662-47401-3\_7},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiWGWH14,
  author       = {Qian Li and
                  Weiguo Wu and
                  Liang Gao and
                  Lei Wang and
                  Jianhang Huang},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {A Dynamic Load Balancing Strategy Based on Feedback for Cluster Rendering
                  System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {41--47},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_6},
  doi          = {10.1007/978-3-662-47401-3\_6},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiWGWH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiXZH14,
  author       = {Baohui Li and
                  Kefu Xu and
                  Chuang Zhang and
                  Yue Hu},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {{SFAPCC:} {A} Secure and Flexible Architecture for Public Cloud Computing},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {160--165},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_21},
  doi          = {10.1007/978-3-662-47401-3\_21},
  timestamp    = {Wed, 31 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiXZH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiuSFLY14,
  author       = {Xiaomei Liu and
                  Yong Sun and
                  Liang Fang and
                  Junpeng Liu and
                  Lingjing Yu},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {A Survey of Network Traffic Visualization in Detecting Network Security
                  Threats},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {91--98},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_12},
  doi          = {10.1007/978-3-662-47401-3\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiuSFLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LuZSLS14,
  author       = {Qiuwen Lu and
                  Zhou Zhou and
                  Hongzhou Sha and
                  Qingyun Liu and
                  Hongcheng Sun},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Self-Adaptive Frequency Scaling Architecture for Intrusion Detection
                  System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {74--82},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_10},
  doi          = {10.1007/978-3-662-47401-3\_10},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/LuZSLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/MonizY14,
  author       = {Krishna Moniz and
                  Yuyu Yuan},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Reaching Critical Mass: The Effect of Adding New Content on Website
                  Visitors and User Registration},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {359--369},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_47},
  doi          = {10.1007/978-3-662-47401-3\_47},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/MonizY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/PengSDT14,
  author       = {Huailiang Peng and
                  Majing Su and
                  Qiong Dai and
                  Jianlong Tan},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Enhancing Security and Robustness of {P2P} Caching System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {56--64},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_8},
  doi          = {10.1007/978-3-662-47401-3\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/PengSDT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/RennochW0S14,
  author       = {Axel Rennoch and
                  Marc{-}Florian Wendland and
                  Andreas Hoffmann and
                  Martin A. Schneider},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Advanced Test Modelling and Execution Based on the International Standardized
                  Techniques {TTCN-3} and {UTP}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {245--252},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_32},
  doi          = {10.1007/978-3-662-47401-3\_32},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/RennochW0S14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ShaLLZZW14,
  author       = {Hongzhou Sha and
                  Xiaoqian Li and
                  Qingyun Liu and
                  Zhou Zhou and
                  Liang Zhang and
                  Lidong Wang},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {{RAMID:} {A} Novel Risk Assessment Model of Information Dissemination
                  on Social Network},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {295--303},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_39},
  doi          = {10.1007/978-3-662-47401-3\_39},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/ShaLLZZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ShaoLT14,
  author       = {Yan Shao and
                  Yanbing Liu and
                  Jianlong Tan},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Accelerating {DFA} Construction by Parallelizing Subset Construction},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {16--24},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_3},
  doi          = {10.1007/978-3-662-47401-3\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ShaoLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/TangZW14,
  author       = {Jiqiang Tang and
                  Xiaoxiang Zou and
                  Dongbin Wang},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Design and Performance Analysis of Utility Maximization-Based Cooperative
                  {MAC} in Multi-rate WiFi Networks},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {213--220},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_28},
  doi          = {10.1007/978-3-662-47401-3\_28},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/TangZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WuFZX14,
  author       = {Xu Wu and
                  Yue Fan and
                  Xi Zhang and
                  Jin Xu},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Research of eID Mobile Identity Authentication Method},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {350--358},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_46},
  doi          = {10.1007/978-3-662-47401-3\_46},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WuFZX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WuLXX14,
  author       = {Xu Wu and
                  Pengchong Li and
                  Jin Xu and
                  Xiaqing Xie},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Domain-Specific Semantic Retrieval of Institutional Repository Based
                  on Query Extension},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {401--411},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_51},
  doi          = {10.1007/978-3-662-47401-3\_51},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WuLXX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WuSX14,
  author       = {Xu Wu and
                  Jiada Shi and
                  Xiaqing Xie},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {The Design and Implementation of {APK} eBooks Online Generation System
                  Based on FBReader},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {389--400},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_50},
  doi          = {10.1007/978-3-662-47401-3\_50},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WuSX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WuZZX14,
  author       = {Xu Wu and
                  Weiyi Zhang and
                  Xi Zhang and
                  Jin Xu},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {A Method to Build and Expand the Domain Dictionary Automatically Based
                  on WordNet},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {370--381},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_48},
  doi          = {10.1007/978-3-662-47401-3\_48},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WuZZX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/XieL14,
  author       = {Yibo Xie and
                  Zhongzhi Luan},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Information Integration of Heterogeneous Employment Service Information
                  of College Graduates},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {336--341},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_44},
  doi          = {10.1007/978-3-662-47401-3\_44},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/XieL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/XuCG14,
  author       = {Ling Xu and
                  Yueyun Chen and
                  Zheng Gong},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {An Improving Algorithm for Combined Input-Crosspoint-Queued Switches},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {281--287},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_37},
  doi          = {10.1007/978-3-662-47401-3\_37},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/XuCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/Yan14,
  author       = {Xiaodong Yan},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {A Uighur Automatic Summarization Method Based on Sub-theme Division},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {8--15},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_2},
  doi          = {10.1007/978-3-662-47401-3\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/Yan14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YangJH14,
  author       = {Yunxue Yang and
                  Shuyuan Jin and
                  Xiaowei He},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Software Vulnerability Severity Evaluation Based on Economic Losses},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {144--151},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_19},
  doi          = {10.1007/978-3-662-47401-3\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YangJH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YangLZ14,
  author       = {Fan Yang and
                  Yue Li and
                  Lidong Zhai},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {RayDroid: {A} Framework for Discovering Anomaly in Android},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {33--40},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_5},
  doi          = {10.1007/978-3-662-47401-3\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YangLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YangYZ14,
  author       = {Jincui Yang and
                  Yuyu Yuan and
                  Tianle Zhang},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Research on Modeling of Software Automatic Test},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {382--388},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_49},
  doi          = {10.1007/978-3-662-47401-3\_49},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YangYZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YaoZXCG14,
  author       = {Qipeng Yao and
                  Chuan Zhou and
                  Linbo Xiang and
                  Yanan Cao and
                  Li Guo},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Minimizing the Negative Influence by Blocking Links in Social Networks},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {65--73},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_9},
  doi          = {10.1007/978-3-662-47401-3\_9},
  timestamp    = {Wed, 05 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/YaoZXCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YeDBL14,
  author       = {Na Ye and
                  Lili Dong and
                  Genqing Bian and
                  Jian Li},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Construction of Software and Hardware Resource Pool in Data Center
                  Using Virtualization},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {206--212},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_27},
  doi          = {10.1007/978-3-662-47401-3\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YeDBL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YeLY14,
  author       = {Lin Ye and
                  Zhongzhi Luan and
                  Hailong Yang},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Performance-Aware Based Correlated Datasets Replication Strategy},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {322--327},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_42},
  doi          = {10.1007/978-3-662-47401-3\_42},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YeLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YilanLGB14,
  author       = {Ma Yilan and
                  Yao Lin and
                  Zeng Guang and
                  Matturdi Bardi},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {The Implementation of {GFP} Protocol Based on {EOS} in {FPGA}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {274--280},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_36},
  doi          = {10.1007/978-3-662-47401-3\_36},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YilanLGB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangJS14,
  author       = {Xi Zhang and
                  Guanhong Jiang and
                  Yuan Su},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Monitoring Social Events on Sina Weibo},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {328--335},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_43},
  doi          = {10.1007/978-3-662-47401-3\_43},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangJS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangLSY14,
  author       = {Tianle Zhang and
                  Lixin Liu and
                  Shouyou Song and
                  Yuyu Yuan},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Human Mobility Simulation in Smart Energy Grid},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {229--237},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_30},
  doi          = {10.1007/978-3-662-47401-3\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangLSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangLZ14,
  author       = {Shuai Zhang and
                  Yueming Lu and
                  Xi Zhang},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Cache Replacement Improving Based on User Group Interest Degree},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {1--7},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_1},
  doi          = {10.1007/978-3-662-47401-3\_1},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangSH14,
  author       = {Zilu Zhang and
                  Jinqiao Shi and
                  Lanlan Hu},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Towards Enumeration of {NTFS} Using {USN} Journals Under {UEFI}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {166--174},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_22},
  doi          = {10.1007/978-3-662-47401-3\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhaoCY14,
  author       = {Hui Zhao and
                  Yueyun Chen and
                  Xiaopan Yuan},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {A New Network Coding Scheme in Two-relay {OFDMA} Networks},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {288--294},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_38},
  doi          = {10.1007/978-3-662-47401-3\_38},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhaoCY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhengHZ14,
  author       = {Yi Zheng and
                  Weihong Han and
                  Chengzhang Zhu},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {A Novel Feature Selection Method Based on Category Distribution and
                  Phrase Attributes},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {25--32},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_4},
  doi          = {10.1007/978-3-662-47401-3\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhengHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhuWLQZC14,
  author       = {Danfeng Zhu and
                  Rui Wang and
                  Zhongzhi Luan and
                  Depei Qian and
                  Han Zhang and
                  Jihong Cai},
  editor       = {Yueming Lu and
                  Xu Wu and
                  Xi Zhang},
  title        = {Memory Centric Hardware Prefetching in Multi-core Processors},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2014, Beijing, China, November 28-29, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {520},
  pages        = {311--321},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-47401-3\_41},
  doi          = {10.1007/978-3-662-47401-3\_41},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhuWLQZC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isctcs/2013,
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43908-1},
  doi          = {10.1007/978-3-662-43908-1},
  isbn         = {978-3-662-43907-4},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/0001B13,
  author       = {Tingting Wang and
                  J{\o}rgen B{\o}egh},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Multi-layer {CAPTCHA} Based on Chinese Character Deformation},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {205--211},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_27},
  doi          = {10.1007/978-3-662-43908-1\_27},
  timestamp    = {Wed, 27 Jun 2018 10:47:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/0001B13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/AnakpaY13,
  author       = {Manawa Anakpa and
                  Yuyu Yuan},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Multidisciplinary Trust Conceptualization: {A} General Model for Customer
                  Trust Building in e-Commerce},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {366--373},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_45},
  doi          = {10.1007/978-3-662-43908-1\_45},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/AnakpaY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/Boegh13,
  author       = {J{\o}rgen B{\o}egh},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Trust and Trustworthiness in Human Behavior and {IT} Services - Concepts,
                  Definitions and Relations},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {235--251},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_31},
  doi          = {10.1007/978-3-662-43908-1\_31},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/Boegh13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ChenGZ13,
  author       = {Luping Chen and
                  Yongzhen Guo and
                  Feng Zhou},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Security Risk Assessment of Mobile Internet Under Cloud Computing
                  Mode},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {219--226},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_29},
  doi          = {10.1007/978-3-662-43908-1\_29},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ChenGZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ChenLSZZ13,
  author       = {Chen Chen and
                  Qingyun Liu and
                  Hongzhou Sha and
                  Zhou Zhou and
                  Chao Zheng},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A New Approach to Decrease Invalidate Rate of Weak Consistency Methods
                  in Web Proxy Caching},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {107--114},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_14},
  doi          = {10.1007/978-3-662-43908-1\_14},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/ChenLSZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/FanWGW13,
  author       = {Yuanquan Fan and
                  Wei Wei and
                  Yan Gao and
                  Weiguo Wu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Introduction and Analysis of Simulators of MapReduce},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {345--350},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_42},
  doi          = {10.1007/978-3-662-43908-1\_42},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/FanWGW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/FengZZ13,
  author       = {Gangfu Feng and
                  Chen Zhang and
                  Quan Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Design of Linkage Security Defense System Based on Honeypot},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {70--77},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_9},
  doi          = {10.1007/978-3-662-43908-1\_9},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/FengZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/GuanZLL013,
  author       = {Jizeng Guan and
                  Xiaolu Zhu and
                  Mingtao Lei and
                  Jianyi Liu and
                  Cong Wang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Business Impact Analysis Model Based on the Analytic Hierarchy Process},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {227--234},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_30},
  doi          = {10.1007/978-3-662-43908-1\_30},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/GuanZLL013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/GuoSJ0LC13,
  author       = {Yaoyao Guo and
                  Songlin Sun and
                  Xiaojun Jing and
                  Hai Huang and
                  Yueming Lu and
                  Na Chen},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Effective Rate Control Algorithm for {H.264} Based on Scene Change
                  Detection},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {93--99},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_12},
  doi          = {10.1007/978-3-662-43908-1\_12},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/GuoSJ0LC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/HuangZT13,
  author       = {Anqi Huang and
                  Chen Zhang and
                  Chaojing Tang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Another Improvement of {LMAP++:} An {RFID} Authentication Protocol},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {100--106},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_13},
  doi          = {10.1007/978-3-662-43908-1\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/HuangZT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/JiangL13,
  author       = {Yanjun Jiang and
                  Mingshan Lei},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {{MD5} Calculation and Decryption Using {CUDA} on {GPU}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {22--28},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_3},
  doi          = {10.1007/978-3-662-43908-1\_3},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/JiangL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiGB13,
  author       = {Yue Li and
                  Qingyang Gao and
                  J{\o}rgen B{\o}egh},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {The Evaluation of Service Trustworthiness Based on BP-Neural Network},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {185--190},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_24},
  doi          = {10.1007/978-3-662-43908-1\_24},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiGB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiZHX13,
  author       = {Hu Li and
                  Peng Zou and
                  Weihong Han and
                  Rongze Xia},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Imbalanced Chinese Text Classification Based on Weighted Sampling},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {38--45},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_5},
  doi          = {10.1007/978-3-662-43908-1\_5},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiZHX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiuF13,
  author       = {Enjie Liu and
                  Xiaohua Feng},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Trustworthiness in the Patient Centred Health Care System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {362--365},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_44},
  doi          = {10.1007/978-3-662-43908-1\_44},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiuF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiuHZ13,
  author       = {Qian Liu and
                  Qianwen He and
                  Yu Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Covert Channel Bases on {CPU} Load in Cloud Computing},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {276--282},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_35},
  doi          = {10.1007/978-3-662-43908-1\_35},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiuHZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiuTWL13,
  author       = {Pingping Liu and
                  Zhihong Tian and
                  Xu Wu and
                  Wei Liu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An Improved Common Vulnerability Scoring System Based on K-means},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {62--69},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_8},
  doi          = {10.1007/978-3-662-43908-1\_8},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiuTWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiuZW0W13,
  author       = {Genxian Liu and
                  Xi Zhang and
                  Dongsheng Wang and
                  Zhenyu Liu and
                  Haixia Wang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Security Memory System for Mobile Device or Computer Against Memory
                  Attacks},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_1},
  doi          = {10.1007/978-3-662-43908-1\_1},
  timestamp    = {Wed, 31 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiuZW0W13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LuSGQ13,
  author       = {Lilei Lu and
                  Yanhong Shang and
                  Yaping Ge and
                  Jinli Qu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Research of Digital Campus Construction Based on Cloud Computing},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {198--204},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_26},
  doi          = {10.1007/978-3-662-43908-1\_26},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LuSGQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/MeiZQB13,
  author       = {Chengli Mei and
                  Min Zhang and
                  Zhongang Qi and
                  Qi Bi},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Characterizing and Comparing User Location Preference in an Urban
                  Mobile Network},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {389--396},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_48},
  doi          = {10.1007/978-3-662-43908-1\_48},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/MeiZQB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/MengYLQXD13,
  author       = {You Meng and
                  Lang Yu and
                  Zhongzhi Luan and
                  Depei Qian and
                  Ming Xie and
                  Zhigao Du},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Black-Box Approach for Detecting the Failure Traces},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {252--259},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_32},
  doi          = {10.1007/978-3-662-43908-1\_32},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/MengYLQXD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/MiandrilalaY13,
  author       = {Miandrilala and
                  Yuyu Yuan},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Concept of Service Trustworthiness Management System {(STMS)}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {374--381},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_46},
  doi          = {10.1007/978-3-662-43908-1\_46},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/MiandrilalaY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/MonizY13,
  author       = {Krishna Moniz and
                  Yuyu Yuan},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Filtering Training Data When Training Feed-Forward Artificial Neural
                  Network},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {212--218},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_28},
  doi          = {10.1007/978-3-662-43908-1\_28},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/MonizY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/PeiZLL13,
  author       = {Shaojie Pei and
                  Lumin Zhang and
                  Aiping Li and
                  Yusha Liu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Microblog Sentiment Classification Based on Supervised and Unsupervised
                  Combination},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {138--145},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_18},
  doi          = {10.1007/978-3-662-43908-1\_18},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/PeiZLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/QiuZHM13,
  author       = {Shaolin Qiu and
                  Laibin Zhang and
                  Yuanqiang Huang and
                  Yaming Mao},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An Effective Resource Management Architecture in {HSE} System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {260--267},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_33},
  doi          = {10.1007/978-3-662-43908-1\_33},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/QiuZHM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/RenLYZ13,
  author       = {Yunlong Ren and
                  Yue Li and
                  Fangfang Yuan and
                  Fangjiao Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Hijacking Activity Technology Analysis and Research in Android System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {46--53},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_6},
  doi          = {10.1007/978-3-662-43908-1\_6},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/RenLYZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/RennochSG13,
  author       = {Axel Rennoch and
                  Ina Schieferdecker and
                  J{\"{u}}rgen Gro{\ss}mann},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Security Testing Approaches - For Research, Industry and Standardization},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {397--406},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_49},
  doi          = {10.1007/978-3-662-43908-1\_49},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/RennochSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ShiGLC13,
  author       = {Xiaohong Shi and
                  Kun Guo and
                  Yueming Lu and
                  Xi Chen},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Survey on Data Recovery for Cloud Storage},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {176--184},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_23},
  doi          = {10.1007/978-3-662-43908-1\_23},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ShiGLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ShiJXL13,
  author       = {Xiaohong Shi and
                  Ying Ji and
                  Hui Xie and
                  Yueming Lu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Prefetching Mechanism Based on MooseFS},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {146--153},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_19},
  doi          = {10.1007/978-3-662-43908-1\_19},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ShiJXL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/Song13,
  author       = {Changning Song},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Android-Based Remote-Control with Real-Time Video Surveillance for
                  Wi-Fi Robot},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {382--388},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_47},
  doi          = {10.1007/978-3-662-43908-1\_47},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/Song13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/SongMY13,
  author       = {Ningning Song and
                  Zhen Mei and
                  Lin Yao},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Research on Efficient Dynamic Cloud Storage Ciphertext Access Control},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {297--303},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_38},
  doi          = {10.1007/978-3-662-43908-1\_38},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/SongMY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/SongZL13,
  author       = {Ningning Song and
                  Longqun Zou and
                  Yunluo Liu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Research on the Inverted Index Based on Compression and Perception},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {304--310},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_39},
  doi          = {10.1007/978-3-662-43908-1\_39},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/SongZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/TongZGM13,
  author       = {Zhixiang Tong and
                  Qiankun Zhuang and
                  Qi Guo and
                  Peijun Ma},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Research on Technologies of Software Requirements Prioritization},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {9--21},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_2},
  doi          = {10.1007/978-3-662-43908-1\_2},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/TongZGM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangBY13,
  author       = {Shuaisen Wang and
                  J{\o}rgen B{\o}egh and
                  Jincui Yang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Research on Trustworthy Sensor Network Based on Zigbee Technology},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {191--197},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_25},
  doi          = {10.1007/978-3-662-43908-1\_25},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangBY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangLCH13,
  author       = {Jiao Wang and
                  Yulin Liu and
                  Zhichao Chao and
                  Wei He},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Modified Single-Channel Blind Separation Method Using {EMD} and
                  {ICA}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {78--85},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_10},
  doi          = {10.1007/978-3-662-43908-1\_10},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangLCH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangLL13,
  author       = {Guofeng Wang and
                  Chuanyi Liu and
                  Jie Lin},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Transparency and Semantics Coexist: When Malware Analysis Meets the
                  Hardware Assisted Virtualization},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {29--37},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_4},
  doi          = {10.1007/978-3-662-43908-1\_4},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangLTW13,
  author       = {Lei Wang and
                  Chenglong Li and
                  Qingfeng Tan and
                  Xuebin Wang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Generation and Distribution of Decoy Document System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {123--129},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_16},
  doi          = {10.1007/978-3-662-43908-1\_16},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangLTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangZLZ13,
  author       = {Peng Wang and
                  Chengwei Zhang and
                  Xuanya Li and
                  Can Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Mobile Botnet Model Based on Android System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {54--61},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_7},
  doi          = {10.1007/978-3-662-43908-1\_7},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangZLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangZP13,
  author       = {Shaopeng Wang and
                  Yuan Zhang and
                  Yan Peng},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Flexible Mechanism Research of Workflow System Based on {SOA}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {86--92},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_11},
  doi          = {10.1007/978-3-662-43908-1\_11},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangZP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangZZ13,
  author       = {Wenhao Wang and
                  Chen Zhang and
                  Quan Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An Anomaly Detection Model Based on Cloud Model and Danger Theory},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {115--122},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_15},
  doi          = {10.1007/978-3-662-43908-1\_15},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WuLSJML13,
  author       = {Di Wu and
                  Xing Li and
                  Yongmei Sun and
                  Yuefeng Ji and
                  Jie Mao and
                  Yingting Liu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Highly Efficient Indoor Localization Scheme Based Only on Mobile
                  Terminal},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {161--168},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_21},
  doi          = {10.1007/978-3-662-43908-1\_21},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WuLSJML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/XieYL13,
  author       = {Xiaowei Xie and
                  Yu Yang and
                  Yueming Lu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Zones-Based Metadata Management Method for Distributed File System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {169--175},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_22},
  doi          = {10.1007/978-3-662-43908-1\_22},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/XieYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YangWS13,
  author       = {Cong Yang and
                  Weiguo Wu and
                  Yuanqi Su},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Level Set Method Based Image Segmentation by Combining Local Information
                  with Global Information},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {351--361},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_43},
  doi          = {10.1007/978-3-662-43908-1\_43},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YangWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangL13,
  author       = {Yu Zhang and
                  Feiyan Li},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Adaptive Synchronization of Complex Networks with Time-Varying Delay
                  Nodes and Delay Coupling},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {283--289},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_36},
  doi          = {10.1007/978-3-662-43908-1\_36},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangLHYS13,
  author       = {Kuo Zhang and
                  Juan{-}Zi Li and
                  MingCai Hong and
                  XueDong Yan and
                  Qiang Song},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Semantics Enabled Intelligent Semi-structured Document Processor},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {328--344},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_41},
  doi          = {10.1007/978-3-662-43908-1\_41},
  timestamp    = {Thu, 25 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangLHYS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangLW13,
  author       = {Kuo Zhang and
                  Juanzi Li and
                  Gang Wu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Term Committee Based Event Identification and Dependency Discovery},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {311--327},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_40},
  doi          = {10.1007/978-3-662-43908-1\_40},
  timestamp    = {Thu, 25 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangZLX13,
  author       = {Ganggang Zhang and
                  Min Zuo and
                  Xinliang Liu and
                  Fan Xia},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Improving the Efficiency of Storing {SNS} Small Files in {HDFS}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {154--160},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_20},
  doi          = {10.1007/978-3-662-43908-1\_20},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangZLX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangZX13,
  author       = {Ying Zhang and
                  Yongzheng Zhang and
                  Jun Xiao},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Detecting the DGA-Based Malicious Domain Names},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {130--137},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_17},
  doi          = {10.1007/978-3-662-43908-1\_17},
  timestamp    = {Fri, 06 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangZX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhaoYWLQ13,
  author       = {Qi Zhao and
                  Hailong Yang and
                  Guang Wei and
                  Zhongzhi Luan and
                  Depei Qian},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Energy Efficiency Evaluation of Workload Execution on Intel Xeon Phi
                  Coprocessor},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {268--275},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_34},
  doi          = {10.1007/978-3-662-43908-1\_34},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhaoYWLQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhouY13,
  author       = {Shihong Zhou and
                  Lin Yao},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Gigabit Ethernet Data Transfer Based on {FPGA}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {290--296},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_37},
  doi          = {10.1007/978-3-662-43908-1\_37},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhouY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isctcs/2012,
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-35795-4},
  doi          = {10.1007/978-3-642-35795-4},
  isbn         = {978-3-642-35794-7},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/Boegh12,
  author       = {J{\o}rgen B{\o}egh},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Trustworthiness: From a Social Phenomenon to Internet Technology},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {87--93},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_11},
  doi          = {10.1007/978-3-642-35795-4\_11},
  timestamp    = {Fri, 29 Jun 2018 13:46:09 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/Boegh12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/CaoCX012,
  author       = {Zigang Cao and
                  Shoufeng Cao and
                  Gang Xiong and
                  Li Guo},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Progress in Study of Encrypted Traffic Classification},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {78--86},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_10},
  doi          = {10.1007/978-3-642-35795-4\_10},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/CaoCX012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ChenSPZ12,
  author       = {Xiaojun Chen and
                  Jinqiao Shi and
                  Yiguo Pu and
                  Haoliang Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An Intent-Driven Masquerader Detection Framework Based on Data Fusion},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {450--457},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_57},
  doi          = {10.1007/978-3-642-35795-4\_57},
  timestamp    = {Sun, 01 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ChenSPZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ChenYW12,
  author       = {Zhao Chen and
                  Wenbin Yao and
                  Cong Wang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Security and Trust Model for Data Disaster-Recovery Service on the
                  Cloud},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {140--147},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_18},
  doi          = {10.1007/978-3-642-35795-4\_18},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ChenYW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/CuiCSZ12,
  author       = {Xiaoyan Cui and
                  Xiaoshuang Chen and
                  Wei Shi and
                  Yi Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {The Application of Robot Localization and Navigation Based on {WSN}
                  in the Disaster Relief},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {621--628},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_78},
  doi          = {10.1007/978-3-642-35795-4\_78},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/CuiCSZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/CuiCZZ12,
  author       = {Xiaoyan Cui and
                  Xiaoshuang Chen and
                  Haitao Zhang and
                  Shizhuo Zheng},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Wireless Sensor Network {MAC} Protocol Used in the City Fire},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {613--620},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_77},
  doi          = {10.1007/978-3-642-35795-4\_77},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/CuiCZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/DingFWHDW12,
  author       = {Yan Ding and
                  Hongyi Fu and
                  Lifeng Wei and
                  Lianyue He and
                  Huadong Dai and
                  Qingbo Wu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Lightweight Type Enforcement Access Control Approach with Role Based
                  Authorization},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {514--521},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_65},
  doi          = {10.1007/978-3-642-35795-4\_65},
  timestamp    = {Mon, 06 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/DingFWHDW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/DingLL12,
  author       = {Wei Ding and
                  Tiejun Lv and
                  Yueming Lu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Low-Complexity Vector Perturbation Precoding Approach Based on Reactive
                  Tabu Search for Large Multiuser {MIMO} Systems},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {317--324},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_40},
  doi          = {10.1007/978-3-642-35795-4\_40},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/DingLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/Esaki12,
  author       = {Kazuhiro Esaki},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Verification of Requirement Analysis Method for System Based on {ISO/IEC}
                  9126 Six Quality Characteristics},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {60--68},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_8},
  doi          = {10.1007/978-3-642-35795-4\_8},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/Esaki12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/EsakiAK12,
  author       = {Kazuhiro Esaki and
                  Motoei Azuma and
                  Toshihiro Komiyama},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Introduction of Quality Requirement and Evaluation Based on {ISO/IEC}
                  SQuaRE Series of Standard},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {94--101},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_12},
  doi          = {10.1007/978-3-642-35795-4\_12},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/EsakiAK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/FanZLX12,
  author       = {Yujian Fan and
                  Hongli Zhang and
                  Jiahui Liu and
                  Dongliang Xu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An Efficient Parallel String Matching Algorithm Based on {DFA}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {349--356},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_44},
  doi          = {10.1007/978-3-642-35795-4\_44},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/FanZLX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/FuGXM12,
  author       = {Peipei Fu and
                  Li Guo and
                  Gang Xiong and
                  Jiao Meng},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Classification Research on {SSL} Encrypted Application},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {404--411},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_51},
  doi          = {10.1007/978-3-642-35795-4\_51},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/FuGXM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/FuJSLW12,
  author       = {Jing Fu and
                  Xiaojun Jing and
                  Songlin Sun and
                  Yueming Lu and
                  Ying Wang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {{C-SURF:} Colored Speeded Up Robust Features},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {203--210},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_26},
  doi          = {10.1007/978-3-642-35795-4\_26},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/FuJSLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/GaoZZ12,
  author       = {Yuan Gao and
                  Yaoxue Zhang and
                  Yuezhi Zhou},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Cache Management Strategy for Transparent Computing Storage System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {651--658},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_82},
  doi          = {10.1007/978-3-642-35795-4\_82},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/GaoZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/GuoL12,
  author       = {Taiping Guo and
                  Zhongzhi Luan},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Compatible and Graphical Modeling Approach for Earth System Model},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {706--713},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_89},
  doi          = {10.1007/978-3-642-35795-4\_89},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/GuoL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/HanW012,
  author       = {Weihong Han and
                  Qingguang Wang and
                  Yan Jia},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Research and Implement of Security Situation Awareness System {YH-SSAS}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {721--729},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_91},
  doi          = {10.1007/978-3-642-35795-4\_91},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/HanW012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/HeT012,
  author       = {Ying He and
                  Yongjing Tao and
                  Tian Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {CppIns: {A} Source Query Language for Instrumentation},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {498--505},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_63},
  doi          = {10.1007/978-3-642-35795-4\_63},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/HeT012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/HuangJSL12,
  author       = {Fei Huang and
                  Xiaojun Jing and
                  Songlin Sun and
                  Yueming Lu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Incorporate Spatial Information into pLSA for Scene Classification},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {170--177},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_22},
  doi          = {10.1007/978-3-642-35795-4\_22},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/HuangJSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/HuangLZS12,
  author       = {Haiqi Huang and
                  Yueming Lu and
                  Fangwei Zhang and
                  Songlin Sun},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Multi-modal Clustering Method for Web Videos},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {163--169},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_21},
  doi          = {10.1007/978-3-642-35795-4\_21},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/HuangLZS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/HuangSL012,
  author       = {Xiaopu Huang and
                  Qingqing Sun and
                  Jiangwei Li and
                  Tian Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {MDE-Based Verification of SysML State Machine Diagram by {UPPAAL}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {490--497},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_62},
  doi          = {10.1007/978-3-642-35795-4\_62},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/HuangSL012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/JiaZFL12,
  author       = {Wentao Jia and
                  Chunyuan Zhang and
                  Jian Fu and
                  Rui Li},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Architecting Dependable Many-Core Processors Using Core-Level Dynamic
                  Redundancy},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {681--688},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_86},
  doi          = {10.1007/978-3-642-35795-4\_86},
  timestamp    = {Wed, 13 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/JiaZFL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/JinYZY12,
  author       = {Songchang Jin and
                  Shuqiang Yang and
                  Xiang Zhu and
                  Hong Yin},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Design of a Trusted File System Based on Hadoop},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {673--680},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_85},
  doi          = {10.1007/978-3-642-35795-4\_85},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/JinYZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/JunXMGL12,
  author       = {Jun Li and
                  Zuo Xin{-}qiang and
                  Zhou Meng{-}qi and
                  Fan Gong{-}yuan and
                  Li Lian{-}cun},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Mining Explainable User Interests from Scalable User Behavior Data},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {211--218},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_27},
  doi          = {10.1007/978-3-642-35795-4\_27},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/JunXMGL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LeiYW12,
  author       = {Mingtao Lei and
                  Wenbin Yao and
                  Cong Wang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Trust-Based Data Backup Method on the Cloud},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {178--185},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_23},
  doi          = {10.1007/978-3-642-35795-4\_23},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LeiYW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiW12,
  author       = {Yuankui Li and
                  Linzhang Wang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Specifying and Detecting Behavioral Changes in Source Code Using Abstract
                  Syntax Tree Differencing},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {466--473},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_59},
  doi          = {10.1007/978-3-642-35795-4\_59},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiWLX12,
  author       = {Chunwen Li and
                  Xu Wu and
                  Chuanyi Liu and
                  Xiaqing Xie},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An Implementation of Trusted Remote Attestation Oriented the IaaSCloud},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {194--202},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_25},
  doi          = {10.1007/978-3-642-35795-4\_25},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiWLX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiWST12,
  author       = {Yang Li and
                  Xiaoyan Wang and
                  Ying Sha and
                  Jianlong Tan},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Research of Security Relationship Based on Social Networks},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {547--554},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_69},
  doi          = {10.1007/978-3-642-35795-4\_69},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiWST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiX12,
  author       = {Chengcheng Li and
                  Yuanfang Xu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Based on Support Vector and Word Features New Word Discovery Research},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {287--294},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_36},
  doi          = {10.1007/978-3-642-35795-4\_36},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiZSHZ012,
  author       = {Jiangwei Li and
                  Jizhou Zhao and
                  Qingqing Sun and
                  Xiaopu Huang and
                  Yan Zhang and
                  Tian Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Composition of {AADL} Components by Transformation to Interface Automata},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {522--529},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_66},
  doi          = {10.1007/978-3-642-35795-4\_66},
  timestamp    = {Wed, 01 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiZSHZ012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiZWR12,
  author       = {Yue Li and
                  Lidong Zhai and
                  Zhilei Wang and
                  Yunlong Ren},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Control Method of Twitter- and SMS-Based Mobile Botnet},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {644--650},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_81},
  doi          = {10.1007/978-3-642-35795-4\_81},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiZWR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiangXZ0012,
  author       = {Zheng Liang and
                  Bingying Xu and
                  Jie Zhao and
                  Yan Jia and
                  Bin Zhou},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Chinese New Words Detection Using Mutual Information},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {341--348},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_43},
  doi          = {10.1007/978-3-642-35795-4\_43},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiangXZ0012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/Liu0H12,
  author       = {Fei Liu and
                  Yan Jia and
                  Weihong Han},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Multi-phase k-anonymity Algorithm Based on Clustering Techniques},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {365--372},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_46},
  doi          = {10.1007/978-3-642-35795-4\_46},
  timestamp    = {Sun, 08 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/Liu0H12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiuFD12,
  author       = {Qingyun Liu and
                  Wenzhong Feng and
                  Qiong Dai},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Dynamic Strategy to Cache Out-of-Sequence Packet in {DPI} System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {564--571},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_71},
  doi          = {10.1007/978-3-642-35795-4\_71},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiuFD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiuLW12,
  author       = {Chuanyi Liu and
                  Xiaojian Liu and
                  Lei Wan},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Policy-Based De-duplication in Secure Cloud Storage},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {250--262},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_32},
  doi          = {10.1007/978-3-642-35795-4\_32},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiuLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiuSWG12,
  author       = {Peipeng Liu and
                  Jinqiao Shi and
                  Lihong Wang and
                  Li Guo},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An Efficient Ellipse-Shaped Blobs Detection Algorithm for Breaking
                  Facebook {CAPTCHA}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {420--428},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_53},
  doi          = {10.1007/978-3-642-35795-4\_53},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiuSWG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/MaLZS12,
  author       = {Liang Ma and
                  Yueming Lu and
                  Fangwei Zhang and
                  Songlin Sun},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Dynamic Task Scheduling in Cloud Computing Based on Greedy Strategy},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {156--162},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_20},
  doi          = {10.1007/978-3-642-35795-4\_20},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/MaLZS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/NamiS12,
  author       = {Mitra Nami and
                  Witold Suryn},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Software Trustworthiness: Past, Present and Future},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_1},
  doi          = {10.1007/978-3-642-35795-4\_1},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/NamiS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/NamiS12a,
  author       = {Mitra Nami and
                  Witold Suryn},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Software Testing is Necessary But Not Sufficient for Software Trustworthiness},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {34--44},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_5},
  doi          = {10.1007/978-3-642-35795-4\_5},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/NamiS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/NiuLS12,
  author       = {Shuai Niu and
                  Yanbing Liu and
                  Xinbo Song},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Speeding Up Double-Array Trie Construction for String Matching},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {572--579},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_72},
  doi          = {10.1007/978-3-642-35795-4\_72},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/NiuLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/NiuLZS12,
  author       = {Yanting Niu and
                  Yueming Lu and
                  Fangwei Zhang and
                  Songlin Sun},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Distance Adaptive Embedding Method in Dimension Reduction},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {271--278},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_34},
  doi          = {10.1007/978-3-642-35795-4\_34},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/NiuLZS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/PangJLLR12,
  author       = {Yi Pang and
                  Shuyuan Jin and
                  Shicong Li and
                  Jilei Li and
                  Hao Ren},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {OpenVPN Traffic Identification Using Traffic Fingerprints and Statistical
                  Characteristics},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {443--449},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_56},
  doi          = {10.1007/978-3-642-35795-4\_56},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/PangJLLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/PangZSD12,
  author       = {Yao Pang and
                  Xiaoxiao Zhang and
                  Luwei Sun and
                  Weimin Ding},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Research on Identifying Method of Covert Channels in Database System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {26--33},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_4},
  doi          = {10.1007/978-3-642-35795-4\_4},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/PangZSD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/PuSG12,
  author       = {Yiguo Pu and
                  Jinqiao Shi and
                  Li Guo},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Hierarchical Method for Clustering Binary Text Image},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {388--396},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_49},
  doi          = {10.1007/978-3-642-35795-4\_49},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/PuSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/RaoZZTY12,
  author       = {Bing Rao and
                  Zhigang Zhou and
                  Hongli Zhang and
                  Shuofei Tang and
                  Renfu Yao},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Outsourcing Cloud Data Privacy-Preserving Based on Over-Encryption},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {109--116},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_14},
  doi          = {10.1007/978-3-642-35795-4\_14},
  timestamp    = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/RaoZZTY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ShaoJSL12,
  author       = {Chenggang Shao and
                  Xiaojun Jing and
                  Songlin Sun and
                  Yueming Lu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Active RFID-Based Indoor Localization Algorithm Using Virtual Reference
                  through Bivariate Newton Interpolation},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {186--193},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_24},
  doi          = {10.1007/978-3-642-35795-4\_24},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ShaoJSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/SuLL12,
  author       = {Yinjie Su and
                  Jiahui Liu and
                  Dong Li},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Hiding Signatures in Variable Names},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {333--340},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_42},
  doi          = {10.1007/978-3-642-35795-4\_42},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/SuLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/SunHL012,
  author       = {Qingqing Sun and
                  Xiaopu Huang and
                  Jiangwei Li and
                  Tian Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Timing Aspects Construction Using {UML-MARTE} Profile},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {474--481},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_60},
  doi          = {10.1007/978-3-642-35795-4\_60},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/SunHL012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangBLZ12,
  author       = {Chunlu Wang and
                  Yu Bao and
                  Xuesen Liang and
                  Tianle Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Vulnerability Evaluating Based on Attack Graph},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {555--563},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_70},
  doi          = {10.1007/978-3-642-35795-4\_70},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangBLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangCLL12,
  author       = {Shuai Wang and
                  Xiang Cui and
                  Peng Liao and
                  Dan Li},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {{S-URL} Flux: {A} Novel C{\&}C Protocol for Mobile Botnets},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {412--419},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_52},
  doi          = {10.1007/978-3-642-35795-4\_52},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangCLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangHS12,
  author       = {Dong Wang and
                  Hui He and
                  Jiantao Shi},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {The Measurement and Analysis of {KAD} Network},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {117--123},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_15},
  doi          = {10.1007/978-3-642-35795-4\_15},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangLZS12,
  author       = {Fei Wang and
                  Yueming Lu and
                  Fangwei Zhang and
                  Songlin Sun},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A New Method Based on Fuzzy C-Means Algorithm for Search Results Clustering},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {263--270},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_33},
  doi          = {10.1007/978-3-642-35795-4\_33},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangLZS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangLZYW12,
  author       = {Hongqi Wang and
                  Zongwei Luo and
                  Tianle Zhang and
                  Yuyu Yuan and
                  Xu Wu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Pervasive Technology Approach to Social Trustworthiness},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {242--249},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_31},
  doi          = {10.1007/978-3-642-35795-4\_31},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangLZYW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangSG12,
  author       = {Xiao Wang and
                  Jinqiao Shi and
                  Li Guo},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Towards Analyzing Traceability of Data Leakage by Malicious Insiders},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {148--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_19},
  doi          = {10.1007/978-3-642-35795-4\_19},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangSTGL12,
  author       = {Kun Wang and
                  Ying Sha and
                  Jianlong Tan and
                  Li Guo and
                  Yang Li},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Finding {\(\delta\)}-Closure Property of BitTorrent System and Applications
                  Based on This Property},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {530--538},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_67},
  doi          = {10.1007/978-3-642-35795-4\_67},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangSTGL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangXSTG12,
  author       = {Xiaoyan Wang and
                  Kai Xu and
                  Ying Sha and
                  Jianlong Tan and
                  Li Guo},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Research of New Words Identification in Social Network for Monitoring
                  Public Opinion},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {598--603},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_75},
  doi          = {10.1007/978-3-642-35795-4\_75},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangXSTG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WangZML12,
  author       = {Zhilei Wang and
                  Lidong Zhai and
                  Yongqiang Ma and
                  Yue Li},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Analysis of Public Sentiment Based on {SMS} Content},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {637--643},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_80},
  doi          = {10.1007/978-3-642-35795-4\_80},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WangZML12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WuH0L12,
  author       = {Mingfei Wu and
                  Yi Han and
                  Bin Zhou and
                  Aiping Li},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Preliminary Study of Enhanced Collaborative Information Extracting
                  and Sharing System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {698--705},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_88},
  doi          = {10.1007/978-3-642-35795-4\_88},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WuH0L12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WuLZC12,
  author       = {Junchao Wu and
                  Panpan Li and
                  Hongli Zhang and
                  Binsheng Chu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Reliable Query Scheme for Outsourced Data in Cloud},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {730--736},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_92},
  doi          = {10.1007/978-3-642-35795-4\_92},
  timestamp    = {Sun, 19 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WuLZC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WuWT12,
  author       = {Fuhui Wu and
                  Qingbo Wu and
                  Yusong Tan},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Comparison and Performance Analysis of Join Approach in MapReduce},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {629--636},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_79},
  doi          = {10.1007/978-3-642-35795-4\_79},
  timestamp    = {Mon, 06 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WuWT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WuXLL12,
  author       = {Xu Wu and
                  Xiaqing Xie and
                  Chuanyi Liu and
                  Chunwen Li},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An Improved Design of the Trustworthiness Authentication Mechanism
                  of IaaS},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {219--226},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_28},
  doi          = {10.1007/978-3-642-35795-4\_28},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WuXLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/WuYF12,
  author       = {Jinyu Wu and
                  Lihua Yin and
                  Binxing Fang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Novel Dynamic Self-adaptive Framework for Network Security Evaluation},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {604--612},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_76},
  doi          = {10.1007/978-3-642-35795-4\_76},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/WuYF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/XieLWSL12,
  author       = {Peidai Xie and
                  Xicheng Lu and
                  Yongjun Wang and
                  Jinshu Su and
                  Meijian Li},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An Automatic Approach to Detect Anti-debugging in Malware Analysis},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {436--442},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_55},
  doi          = {10.1007/978-3-642-35795-4\_55},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/XieLWSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/XinHLW12,
  author       = {Chao Xin and
                  Hui{-}jun Han and
                  Xiuqin Lin and
                  Gengyu Wei},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A {P2P} Reputation Model Based on {P2P} File-Sharing Behavioral Characteristics},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {373--379},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_47},
  doi          = {10.1007/978-3-642-35795-4\_47},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/XinHLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/XingWZ12,
  author       = {Yuchen Xing and
                  Hanfei Wang and
                  Jianhua Zhao},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An Integration of Several Different Data Flow Analysis Techniques},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {458--465},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_58},
  doi          = {10.1007/978-3-642-35795-4\_58},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/XingWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/XiongHZSLG12,
  author       = {Gang Xiong and
                  Wenting Huang and
                  Yong Zhao and
                  Ming Song and
                  Zhenzhen Li and
                  Li Guo},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy
                  Behavior Association},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {132--139},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_17},
  doi          = {10.1007/978-3-642-35795-4\_17},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/XiongHZSLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/XiongYL12,
  author       = {Dapeng Xiong and
                  Zhang Yan and
                  Aiping Li},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Study on Transformed Keywords Identification in Spam Filtering},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {689--697},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_87},
  doi          = {10.1007/978-3-642-35795-4\_87},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/XiongYL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/Xu0W12,
  author       = {Qing Xu and
                  Yu Pei and
                  Linzhang Wang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An Evaluation Framework of Coverage-Based Fault Localization for Object-Oriented
                  Programs},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {591--597},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_74},
  doi          = {10.1007/978-3-642-35795-4\_74},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/Xu0W12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/XuL0012,
  author       = {Bingying Xu and
                  Zheng Liang and
                  Yan Jia and
                  Bin Zhou},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Community Detection Based on Robust Label Propagation Algorithm},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {303--310},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_38},
  doi          = {10.1007/978-3-642-35795-4\_38},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/XuL0012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/XuTSG12,
  author       = {Fanwen Xu and
                  Qingfeng Tan and
                  Jinqiao Shi and
                  Li Guo},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Unobservable Rendezvous Negotiation in {P2P} Networks},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {380--387},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_48},
  doi          = {10.1007/978-3-642-35795-4\_48},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/XuTSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/XuehaiJ12,
  author       = {Liu Xuehai and
                  Tang Jin},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Clock Synchronization Algorithm for Distributed Video Surveillance
                  Based on {PTP}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {311--316},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_39},
  doi          = {10.1007/978-3-642-35795-4\_39},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/XuehaiJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YangFYZ12,
  author       = {Jincui Yang and
                  Bin{-}Xing Fang and
                  Yuyu Yuan and
                  Meng{-}Xiao Zhai},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Research on Simulation and Real-Time Evaluation Method of IoT-Oriented
                  Complex System},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {227--235},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_29},
  doi          = {10.1007/978-3-642-35795-4\_29},
  timestamp    = {Sat, 11 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YangFYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YaoHX12,
  author       = {Yao Yao and
                  Longtao He and
                  Gang Xiong},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Security and Cost Analyses of {DNSSEC} Protocol},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {429--435},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_54},
  doi          = {10.1007/978-3-642-35795-4\_54},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YaoHX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YaoY12,
  author       = {Xiang Yao and
                  Wenbin Yao},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Trustworthy Storage Framework on the Cloud},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {69--77},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_9},
  doi          = {10.1007/978-3-642-35795-4\_9},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YaoY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YinglianBQ12,
  author       = {Liu Yinglian and
                  J{\o}rgen B{\o}egh and
                  Sun Qi},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Who Can Haul the {ANDON-CORD} in the Software Development Process},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {714--720},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_90},
  doi          = {10.1007/978-3-642-35795-4\_90},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YinglianBQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YuLSZ12,
  author       = {Jinxiu Yu and
                  Yueming Lu and
                  Songlin Sun and
                  Fangwei Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Search Results Evaluation Based on User Behavior},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {397--403},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_50},
  doi          = {10.1007/978-3-642-35795-4\_50},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YuLSZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YuZY12,
  author       = {Haining Yu and
                  Hongli Zhang and
                  Xingzhan Yu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Flexible Framework for Representations of Entities in the Internet
                  of Things},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {295--302},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_37},
  doi          = {10.1007/978-3-642-35795-4\_37},
  timestamp    = {Sun, 19 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YuZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YuanHQ12,
  author       = {Yuyu Yuan and
                  Qiang Han and
                  Sun Qi},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A New Measurement Method for Software Trustworthiness Based on Rough
                  Sets},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {13--19},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_2},
  doi          = {10.1007/978-3-642-35795-4\_2},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YuanHQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YuanLWW12,
  author       = {De{-}yu Yuan and
                  Tong Liu and
                  Geng{-}yu Wei and
                  Zhi{-}zhao Wang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Survey on the Security of Multihop Ad Hoc Network},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {102--108},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_13},
  doi          = {10.1007/978-3-642-35795-4\_13},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YuanLWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/YuanZL12,
  author       = {Yuyu Yuan and
                  Yangyang Zhang and
                  Jing Liu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Service Behavior Trustworthiness Management},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {20--25},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_3},
  doi          = {10.1007/978-3-642-35795-4\_3},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/YuanZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangC012,
  author       = {Xuelin Zhang and
                  Huajie Chen and
                  Tian Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An {UML} Model Query Method Based on Structure Pattern Matching},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {506--513},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_64},
  doi          = {10.1007/978-3-642-35795-4\_64},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangC012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangGYYZ12,
  author       = {Fangjiao Zhang and
                  Wei Guo and
                  Jincui Yang and
                  Fangfang Yuan and
                  Lidong Zhai},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Research on Redundant Channel Model Based on Spatial Correlation in
                  {IOT}},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {666--672},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_84},
  doi          = {10.1007/978-3-642-35795-4\_84},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangGYYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangJC0P12,
  author       = {Yaxing Zhang and
                  Shuyuan Jin and
                  Xiang Cui and
                  Xi Yin and
                  Yi Pang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Network Security Situation Prediction Based on {BP} and {RBF} Neural
                  Network},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {659--665},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_83},
  doi          = {10.1007/978-3-642-35795-4\_83},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangJC0P12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangLZY12,
  author       = {Hongli Zhang and
                  Panpan Li and
                  Zhigang Zhou and
                  Xiangzhan Yu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A PSO-Based Hierarchical Resource Scheduling Strategy on Cloud Computing},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {325--332},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_41},
  doi          = {10.1007/978-3-642-35795-4\_41},
  timestamp    = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangLZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangY12,
  author       = {Yongzheng Zhang and
                  Xiaochun Yun},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Modeling of Hierarchical Index System for Network Operation Security},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {580--590},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_73},
  doi          = {10.1007/978-3-642-35795-4\_73},
  timestamp    = {Fri, 06 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangYBW12,
  author       = {Tianle Zhang and
                  Yuyu Yuan and
                  J{\o}rgen B{\o}egh and
                  Xu Wu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A New Manipulation Based Mobility Model for Vehicular Delay Tolerant
                  Networks},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {236--241},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_30},
  doi          = {10.1007/978-3-642-35795-4\_30},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangYBW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangZZL12,
  author       = {Meng Zhang and
                  Hongli Zhang and
                  Bo Zhang and
                  Gang Lu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Encrypted Traffic Classification Based on an Improved Clustering Algorithm},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {124--131},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_16},
  doi          = {10.1007/978-3-642-35795-4\_16},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangZZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhaoLML12,
  author       = {Xiaolong Zhao and
                  Tiejun Lv and
                  Yanhui Ma and
                  Yueming Lu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Joint Cognitive Access and Power Control in Two-Tie Femtocell Networks},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {279--286},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_35},
  doi          = {10.1007/978-3-642-35795-4\_35},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhaoLML12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhaoLZ012,
  author       = {Jizhou Zhao and
                  Jiangwei Li and
                  Yan Zhang and
                  Tian Zhang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Tool to Construct One Comprehensive Legal Environment for Behavioral
                  Incompatible Components},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {539--546},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_68},
  doi          = {10.1007/978-3-642-35795-4\_68},
  timestamp    = {Wed, 01 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhaoLZ012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhengWW12,
  author       = {Shuo Zheng and
                  Siyang Wang and
                  Cong Wang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Ciphertext Data Retrieval Method Based on Cloud Storage},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {357--364},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_45},
  doi          = {10.1007/978-3-642-35795-4\_45},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhengWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhouZ12,
  author       = {Xiaoyu Zhou and
                  Jianhua Zhao},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An Overtime-Detection Model-Checking Technique for Interrupt Processing
                  Systems},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {482--489},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_61},
  doi          = {10.1007/978-3-642-35795-4\_61},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhouZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhuZZW12,
  author       = {Nafei Zhu and
                  Jiaping Zuo and
                  Yue Zhou and
                  Wei Wang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Overview of Monitor Selection in Computer Networks},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {52--59},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_7},
  doi          = {10.1007/978-3-642-35795-4\_7},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhuZZW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZuoRK12,
  author       = {Jiaping Zuo and
                  Pei Ren and
                  Hao Kong},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {A Measurement Model for Trustworthiness of Information System Based
                  on Third-Party Testing Data},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {45--51},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_6},
  doi          = {10.1007/978-3-642-35795-4\_6},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZuoRK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics