Abstract is missing.
- MTIV: A Trustworthiness Determination Approach for Threat IntelligenceLei Li, Xiaoyong Li, Yali Gao. 5-14 [doi]
- Distributed Caching Based Memory Optimizing Technology for Stream Data of IoVXiaoli Hu, Chao Li, Huibing Zhang, Hongbo Zhang, Ya Zhou. 15-24 [doi]
- Secure Transfer Protocol Between App and Device of Internet of ThingsZhaojie Xu, Xiaoyong Li. 25-34 [doi]
- Rogue Access Points Detection Based on Theory of Semi-Supervised LearningXiaoyan Li, Xiaoyong Li. 35-44 [doi]
- Phishing Detection Method Based on Borderline-Smote Deep Belief NetworkJiahua Zhang, Xiaoyong Li. 45-53 [doi]
- Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding FieldZiwen Liu, Liang Fang, Lihua Yin, Yunchuan Guo, FengHua Li. 54-63 [doi]
- Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE NetworkYa'nan Tian, Wen'an Zhou, Wenlong Liu. 64-73 [doi]
- A SYN Flood Detection Method Based on Self - similarity in Network TrafficDaxiu Zhang, XiaoJuan Zhu, Lu Wang. 74-82 [doi]
- Annotating Network Service Fault Based on Temporal Interval RelationsLeonard Kok, Sook Ling Chua, Chin Kuan Ho, Lee Kien Foo, Mohd Rizal Bin Mohd Ramly. 83-92 [doi]
- An Anonymous Identity-Based Authentication Scheme in Vector NetworkJie Yu, Mangui Liang. 97-104 [doi]
- Two Improved Anonymous Authentication Methods for PCSChunlin Jiang, Shi-lan Wu, Ke Gu. 109-118 [doi]
- Multi-match Segments Similarity Join Algorithm Based on MapReduceHeng Xiao, Xianchun Zhou. 119-127 [doi]
- GPU-Accelerated Histogram Generation on Smart-Phone and WebbrowserHai Jiang, Xianyi Zhu, Yi Xiao, Jiawei Luo, Yan Zheng. 128-136 [doi]
- An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic NetworksJunhai Zhou, Qin Liu, Si-wang Zhou, Yapin Lin. 137-146 [doi]
- A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast MappingFei Peng, Zhen-Jie Yan, Min Long. 147-158 [doi]
- Image Encryption Based on Multi-scrolls Chaotic System and Logistic MapYaoqiang Xiao, Zhiyi Wang, Jun Cao, Jin Yuan. 159-167 [doi]
- A Novel Bivariate Entropy-Based Network Anomaly Detection SystemChristian Callegari, Michele Pagano. 168-179 [doi]
- The Full Provenance Stack: Five Layers for Complete and Meaningful ProvenanceRyan K. L. Ko, Thye Way Phua. 180-193 [doi]
- Neural Network Based Web Log Analysis for Web Intrusion DetectionKai Ma, Rong Jiang, Mianxiong Dong, Yan Jia, Aiping Li. 194-204 [doi]
- Code Abstractions for Automatic Information Flow Control in a Model-Driven ApproachKuzman Katkalov, Kurt Stenzel, Wolfgang Reif. 209-218 [doi]
- WaybackVisor: Hypervisor-Based Scalable Live Forensic Architecture for Timeline AnalysisManabu Hirano, Takuma Tsuzuki, Seishiro Ikeda, Naoga Taka, Kenji Fujiwara, Ryotaro Kobayashi. 219-230 [doi]
- Cloud Ownership and Reliability - Issues and DevelopmentsIsaac Odun-Ayo, Nicholas A. Omoregbe, Modupe Odusami, Olasupo Ajayi. 231-240 [doi]
- A Trust-Based Service Self-organizing Model for Cloud MarketWenjuan Li, Jian Cao, Jiyi Wu, Keyong Hu. 241-250 [doi]
- A Reliable Resource Scheduling for Network Function VirtualizationDaoqiang Xu, Yefei Li, Ming Yin, Xin Li 0017, Hao Li, Zhuzhong Qian. 251-260 [doi]
- On Global Resource Allocation in Clusters for Data AnalyticsDaoqiang Xu, Yefei Li, Songyun Wang, Xin Li 0017, Zhuzhong Qian. 261-270 [doi]
- An Automatic Generation Method for Condition Expressions of CPN Model Focus on Tested BehaviorsTao Sun, Linjing Zhang, Huiping Ma. 271-285 [doi]
- Analysing the Resilience of the Internet of Things Against Physical and Proximity AttacksHe Xu, Daniele Sgandurra, Keith Mayes, Peng Li, Ruchuan Wang. 291-301 [doi]
- Ensuring IoT/M2M System Security Under the Limitation of Constrained GatewaysKuan-Lin Chen, Fuchun Joseph Lin. 302-311 [doi]
- Spatial Reconfigurable Physical Unclonable Functions for the Internet of ThingsArmin Babaei, Gregor Schiele. 312-321 [doi]
- Localizing Wireless Jamming Attacks with Minimal Network ResourcesJing Yang Koh, Pengfei Zhang. 322-334 [doi]
- An Architecture of Urban Regional Health Information System and Its Data Conversion AlgorithmJinfu Chen, Lin Zhang, Hilary Ackah-Arthur, Michael Omari, Jiaxiang Xi. 339-349 [doi]
- CCN Hotspot Cache Placement Strategy Based on Genetic AlgorithmHongjia Wu, Nao Wang, Gaocai Wang. 350-360 [doi]
- The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET)Martin Appiah, Rita Cudjoe. 361-368 [doi]
- A Comparative Study of Zynq-Based OpenFlow Switches in a Software/Hardware Co-designJian Kang, Xiaojun Hei, Jianjian Song. 369-378 [doi]
- Design and Implementation of a Low-Cost Software Defined Wireless Network Testbed for Smart HomeWatipatsa W. Nsunza, Samuel Rutunda, Xiaojun Hei. 379-388 [doi]
- Energy-Efficiency Aware Cooperative Caching Strategy for Content-Centric NetworksWenfei Han, Gaocai Wang, Peng Ying. 389-398 [doi]
- Password Recovery for ZIP Files Based on ARM-FPGA ClusterXu Bai, Lei Jiang, Jiajia Yang, Qiong Dai, Md. Zakirul Alam Bhuiyan. 405-414 [doi]
- Comparison of Different Centrality Measures to Find Influential Nodes in Complex NetworksFanpeng Meng, Yijun Gu, Shunshun Fu, Mengdi Wang, Yuchen Guo. 415-423 [doi]
- An FPGA-Based Algorithm to Accelerate Regular Expression MatchingJiajia Yang, Lei Jiang, Xu Bai, Qiong Dai, Majing Su, Md. Zakirul Alam Bhuiyan. 424-434 [doi]
- A Collaborative Filtering Recommendation Algorithm Based on Score ClassificationJiachang Hao, Kun Niu, Zichao Meng, Shuo Huang, Bing Ma. 435-445 [doi]
- FluteDB: An Efficient and Dependable Time-Series Database Storage EngineChen Li, Jianxin Li, Jinghui Si, Yangyang Zhang. 446-456 [doi]
- Attacks on the Anti-collusion Data Sharing Scheme for Dynamic Groups in the CloudS. Milton Ganesh, Pandi Vijayakumar, L. Jegatha Deborah, Md. Zakirul Alam Bhuiyan. 457-467 [doi]
- Research on Coupling Reliability Problem in Sensor-Cloud SystemYuzhu Liang, Tian Wang, Md. Zakirul Alam Bhuiyan, Anfeng Liu. 468-478 [doi]
- An On-demand Monitoring Approach for Cloud Computing SystemsZhenyue Long, Jijun Zeng, Hong Zou, Yunkui Song. 479-488 [doi]
- Security on "A Lightweight Authentication Scheme with User Untraceability"Niranchana Radhakrishnan, Marimuthu Karuppiah, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan. 489-496 [doi]
- A Security Scheme of Big Data Identity for Cloud EnvironmentRongxin Bao, Xu Yuan, Zhikui Chen, Yujie Zhang. 497-506 [doi]
- A Compact Construction for Non-monotonic Online/Offline CP-ABE SchemeJunqi Zhang, Qingfeng Cheng, Fushan Wei, Xinglong Zhang. 507-523 [doi]
- RPS-TSM: A Robot Perception System Based on Temporal Semantic MapHaoyue Wang, Yangyang Zhang, Jianxin Li, Richong Zhang, Md. Zakirul Alam Bhuiyan. 524-533 [doi]
- MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare DataAbdullah Al Omar, Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto. 534-543 [doi]
- The Art of Using Cross-Layer Design in Cognitive Radio NetworksQusay Medhat Salih, Md. Arafatur Rahman, Md. Zakirul Alam Bhuiyan, Zafril Rizal M. Azmi. 544-556 [doi]
- A Quality Model for Evaluating Encryption-as-a-ServiceJin Wu, Zhiqiang Zhu, Songhui Guo. 557-569 [doi]
- Forensic Detection for Image Operation Order: Resizing and Contrast EnhancementShangde Gao, Xin Liao, Sujin Guo, Xiong Li, Pandi Vijayakumar. 570-580 [doi]
- A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and ExfiltrationJeffrey Haynes, Maribette Ramirez, Thaier Hayajneh, Md. Zakirul Alam Bhuiyan. 581-592 [doi]
- Security and Attack Vector Analysis of IoT DevicesMarc Capellupo, Jimmy Liranzo, Md. Zakirul Alam Bhuiyan, Thaier Hayajneh, Guojun Wang. 593-606 [doi]
- Security Solution of RFID Card Through CryptographyMd. Alam Hossain, Nazmul Hossain, Afridi Shahid, Shawon S. M. Rahman. 607-616 [doi]
- Grouping Users for Quick Recommendations of Text Documents Based on Deep Neural NetworkRajendran Karthika, Lazarus Jegatha Deborah, Pandi Vijayakumar, Sivaraman Audithan. 617-626 [doi]
- Module-Level Software Streaming Loading Model Based on HypervisorLian Duan, Fang Qi, Guojun Wang, Zhe Tang. 627-636 [doi]
- On-Street Car Parking Prediction in Smart City: A Multi-source Data Analysis in Sensor-Cloud EnvironmentWalaa Alajali, Sheng Wen, Wanlei Zhou. 641-652 [doi]
- A Weight-Bind-Based Safe Top-k Query Processing Scheme in Two-Tiered Sensor NetworksXiaoyan Kui, Shigeng Zhang, Wei Li, Ping Zhong, Xingpo Ma, Huakun Du. 653-666 [doi]
- A Floorplanning Algorithm for Partially Reconfigurable FPGA in Wireless Sensor NetworkJinyu Wang, Weiguo Wu, Zhaonan Qin, Dongfang Zhao. 667-679 [doi]
- CO-TDMA: A TDMA Protocol for Collecting Data and OAP at the Same TimeHao He, Weidong Yi, Ming Li, Xiawei Jiang. 680-691 [doi]
- Cloud-Assisted Data Storage and Query Processing at Vehicular Ad-Hoc Sensor NetworksYongxuan Lai, Lv Zheng, Tian Wang, Fang Yang, Qifeng Zhou. 692-702 [doi]
- EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNsHaitao Yu, Qingwen Wang, Nianmin Yao, Yan Chu, Maojie Zhou, Yingrui Ma. 703-713 [doi]
- Fast Truss Decomposition in MemoryYuxuan Xing, Nong Xiao, Yutong Lu, Ronghua Li, Songping Yu, Siqi Gao. 719-729 [doi]
- Pyramid: Revisiting Memory Extension with Remote Accessible Non-Volatile Main MemorySongping Yu, Mingzhu Deng, Yuxuan Xing, Nong Xiao, Fang Liu, Wei Chen 0009. 730-743 [doi]
- Fully Decentralized Multi-Authority ABE Scheme in Data Sharing SystemXiehua Li, Ziyu Huang. 744-756 [doi]
- Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode MatrixZejun Niu, Zheng Qin, Jixin Zhang, Hui Yin. 757-766 [doi]
- Research on Graph Processing Systems on a Single MachineYuxuan Xing, Siqi Gao, Nong Xiao, Fang Liu, Wei Chen 0009. 767-775 [doi]
- 3D Model Reconstruction with Sequence Image of AircraftHuabo Sun, Yang Jiao, Chun Wang, Jingru Han. 776-782 [doi]
- Construction Research on Information Platform for Small and Medium-Sized Enterprises Based on Cloud Storage TechnologyShulan Yu, Yongzheng Tang, Chunfeng Wang. 783-790 [doi]
- XoT: A Flexible Block I/O Data Transfer Protocol for XenJin Zhang, Yuxuan Li, Chengjun Sun, Haoxiang Yang, Jiacheng Wu, Xiaoli Gong. 791-800 [doi]
- Detecting Spliced Face Using Texture AnalysisDivya S. Vidyadharan, Sabu M. Thampi. 805-813 [doi]
- Fine-Grained, Multi-key Search Control in Multi-user Searchable EncryptionManju S. Nair, M. S. Rajasree, Sabu M. Thampi. 814-825 [doi]
- Overview of Performance Evaluation of Keyword Search Utilities in Forensic/E-Discovery SoftwareAdedayo M. Balogun, Tranos Zuva. 826-836 [doi]
- Distribution Network Topology Reconstruction Method Based on Lasso and Its Supplementary CriterionsXiaoyu Li, Shufang Li, Wenqi Li, Shiming Tian, Mingming Pan. 839-851 [doi]