


default search action
4th CIC 2018: Philadelphia, PA, USA
- 4th IEEE International Conference on Collaboration and Internet Computing, CIC 2018, Philadelphia, PA, USA, October 18-20, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-9502-9

Session 1: Security and Privacy I
- Gokhan Sagirlar, Barbara Carminati, Elena Ferrari:

AutoBotCatcher: Blockchain-Based P2P Botnet Detection for the Internet of Things. 1-8 - Ankush Singla, Elisa Bertino:

Blockchain-Based PKI Solutions for IoT. 9-15 - Haroon Rashid

, Pushpendra Singh:
Monitor: An Abnormality Detection Approach in Buildings Energy Consumption. 16-25 - Jongho Won, Elisa Bertino:

Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories. 26-35
Session 2: Social Networks & Recommender Systems
- Quang-Vinh Dang

, Claudia-Lavinia Ignat:
Link-Sign Prediction in Dynamic Signed Directed Networks. 36-45 - Chao Yan, Zhijun Yin, Stanley Xiang, You Chen, Yevgeniy Vorobeychik, Daniel Fabbri

, Abel N. Kho, David M. Liebovitz
, Bradley A. Malin
:
Mining the Best Observational Window to Model Social Phenomena. 46-55 - Julian Jarrett, M. Brian Blake:

Investigating Aspects of Platform Growth on Crowdsource Driven Recommendation Services. 56-63
Session 3: Cloud/Networking
- Malayam Parambath Gilesh, Sanjay Satheesh, Athul Chandran, S. D. Madhu Kumar, Lillykutty Jacob:

Parallel Schedule of Live Migrations for Virtual Machine Placements. 64-70 - Cong Pu

:
Link-Quality and Traffic-Load Aware Routing for UAV Ad Hoc Networks. 71-79 - Jagannadh Vempati, Ram Dantu:

Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face of an Attack. 80-89
Session 4: Applications I
- Vishnu Prasad Ranganthan, Ram Dantu, Aditya Paul

, Paula Mears, Kirill Morozov:
A Decentralized Marketplace Application on the Ethereum Blockchain. 90-97 - Haitham Ghalwash

, Chun-Hsi Huang:
A QoS Framework for SDN-Based Networks. 98-105 - Alaeddine Saadaoui, Stephen L. Scott:

Lightweight Web Services Migration Framework in Hybrid Clouds. 106-113
Session 5: Vision I
- Ashish Kundu, Zehra Sura, Upendra Sharma:

Collaborative and Accountable Hardware Governance Using Blockchain. 114-121 - Barbara Carminati, Elena Ferrari, Christian Rondanini:

Blockchain as a Platform for Secure Inter-Organizational Business Processes. 122-129 - LeRoy Carr III, Anthony Newtson, James Joshi:

Towards Modernizing the Future of American Voting. 130-135
Session 6: Security and Privacy II
- Dakshak Keerthi Chandra, Weerdhawal Chowgule, Yanjie Fu, Dan Lin:

RIPA: Real-Time Image Privacy Alert System. 136-145 - Asmaa Sallam, Elisa Bertino:

Detection of Temporal Data Ex-Filtration Threats to Relational Databases. 146-155 - Victorien Elvinger, Gérald Oster, François Charoy:

Prunable Authenticated Log and Authenticable Snapshot in Distributed Collaborative Systems. 156-165 - Daniel Petrov, Taieb Znati:

Context-Aware Deep Learning-Driven Framework for Mitigation of Security Risks in BYOD-Enabled Environments. 166-175
Session 7: Invited Papers
- Daniele Enrico Asoni, Takayuki Sasaki, Adrian Perrig:

Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture. 176-187 - Craig A. Lee

, Zhiyi Zhang
, Yukai Tu, Alexander Afanasyev
, Lixia Zhang:
Supporting Virtual Organizations Using Attribute-Based Encryption in Named Data Networking. 188-196 - Brian Heredia, Joseph D. Prusa, Taghi M. Khoshgoftaar:

The Impact of Malicious Accounts on Political Tweet Sentiment. 197-202 - Anduo Wang, Jie Wu:

Policy and Resource Orchestration in Software-Defined Networks. 203-206
Session 8: Collaboration
- Jia Zhang

, Maryam Pourreza, Rahul Ramachandran
, Tsengdar J. Lee, Patrick Gatlin, Manil Maskey
, Amanda Marie Weigel:
Facilitating Data-Centric Recommendation in Knowledge Graph. 207-216 - Cristian Gadea, Bogdan Ionescu, Dan Ionescu:

New Algorithms and Methods for Collaborative Co-Editing Using HTML DOM Synchronization. 217-226 - Sebastian Hernandez, Nelson Baloian

, José A. Pino, Xiaojun Yuan:
A Teacher Dashboard for Real-Time Intervention. 227-235
Session 9: Applications II
- Gbadebo Ayoade, Swarup Chandra, Latifur Khan

, Kevin W. Hamlen, Bhavani Thuraisingham:
Automated Threat Report Classification over Multi-Source Data. 236-245 - Nicholas Warren, Benjamin Garrard, Elliot Staudt, Jelena Tesic

:
Transfer Learning of Deep Neural Networks for Visual Collaborative Maritime Asset Identification. 246-255 - Seyed Yahya Nikouei, Yu Chen, Sejun Song, Ronghua Xu, Baek-Young Choi

, Timothy R. Faughnan:
Smart Surveillance as an Edge Network Service: From Harr-Cascade, SVM to a Lightweight CNN. 256-265
Session 10: Vision II
- Jamie Payton, Xiaojiang Du, Xubin He, Jie Wu:

Envisioning an Information Assurance and Performance Infrastructure for the Internet of Things. 266-271 - Muhammad Ejaz Ahmed, Surya Nepal

, Hyoungshick Kim:
MEDUSA: Malware Detection Using Statistical Analysis of System's Behavior. 272-278 - Sihong Xie, Philip S. Yu:

Next Generation Trustworthy Fraud Detection. 279-282
Session 11: Vision III
- Amit Warke, Mohamed Mohamed, Robert Engel, Heiko Ludwig, Wayne Sawdon, Ling Liu:

Storage Service Orchestration with Container Elasticity. 283-292 - Christopher C. Yang, Ou Stella Liang

, Santiago Ontañón, Weimao Ke, Helen Loeb, Charlie Klauer:
Predictive Modeling with Vehicle Sensor Data and IoT for Injury Prevention. 293-298
Session 12: Applications III
- Shaban Shabani, Maria Sokhn

:
Hybrid Machine-Crowd Approach for Fake News Detection. 299-306 - Alexander Rossmann, Gerald Stei:

Understanding the Determinants of Enterprise Social Network Use. 307-316
Session 13: Industry/Government
- Robert Engel, Shashank Rajamoni, Bryant Chen, Heiko Ludwig, Alexander Keller:

ysla: Reusable and Configurable SLAs for Large-Scale SLA Management. 317-325 - Emmanuel Oyekanlu

:
Osmotic Collaborative Computing for Machine Learning and Cybersecurity Applications in Industrial IoT Networks and Cyber Physical Systems with Gaussian Mixture Models. 326-335 - Emmanuel Oyekanlu

:
Fault-Tolerant Real-Time Collaborative Network Edge Analytics for Industrial IoT and Cyber Physical Systems with Communication Network Diversity. 336-345 - Marcela Ribeiro de Oliveira, Israel Barreto Sant'Anna, Guilherme Scariot Ramos, Luis Carlos Erpen De Bona

, Marcos Alexandre Castilho, Marcos Didonet Del Fabro, Eduardo Todt
:
Open Educational Resources Platform Based on Collective Intelligence. 346-353 - Sandeep Nair Narayanan, Ashwinkumar Ganesan, Karuna P. Joshi

, Tim Oates, Anupam Joshi
, Tim Finin
:
Early Detection of Cybersecurity Threats Using Collaborative Cognition. 354-363
TeC4C Workshop I
- Pierfrancesco Bellini, Stefano Bilotta, Daniele Cenni

, Paolo Nesi, Michela Paolucci
, Mirco Soderi
:
Knowledge Modeling and Management for Mobility and Transport Applications. 364-371 - Babu R. Dawadi

, Danda B. Rawat
, Shashidhar R. Joshi, Martina M. Keitsch:
Joint Cost Estimation Approach for Service Provider Legacy Network Migration to Unified Software Defined IPv6 Network. 372-379 - Antonella Longo

, Andrea De Matteis, Marco Zappatore:
Urban Pollution Monitoring Based on Mobile Crowd Sensing: An Osmotic Computing Approach. 380-387 - Paolo Nesi, Gianni Pantaleo

, Michela Paolucci
, Imad Zaza:
Auditing and Assessment of Data Traffic Flows in an IoT Architecture. 388-391
TeC4C Workshop II
- Lorenzo Carnevale

, Antonino Galletta, Maria Fazio, Antonio Celesti, Massimo Villari:
Designing a FIWARE Cloud Solution for Making Your Travel Smoother: The FLIWARE Experience. 392-398 - Sharmila Chackravarthy, Steven Schmitt, Li Yang:

Intelligent Crime Anomaly Detection in Smart Cities Using Deep Learning. 399-404 - João Rei, Claudia Brito

, António Luís Sousa
:
Assessment of an IoT Platform for Data Collection and Analysis for Medical Sensors. 405-411 - Hadi Hajari

, Hassan A. Karimi:
A Method for Large-Scale Resource Allocation in Smart Cities. 412-415
ECISeH Workshop I
- Carla Cavichiolo Flores, Denis Alcides Rezende

, Luisa Aguilar Lopes:
Tapping Into the Use of Social Media Applications for Harnessing the Citizens' Collective Intelligence in the Strategic Digital City. 416-423 - Ahsan Morshed, Abdur Rahim Mohammad Forkan

, Tejal Shah
, Prem Prakash Jayaraman
, Rajiv Ranjan
, Dimitrios Georgakopoulos
:
Visual Analytics Ontology-Guided I-DE System: A Case Study of Head and Neck Cancer in Australia. 424-429 - Robert Olszewski

, Agnieszka Turek
:
Using Fuzzy Geoparticipation Methods to Optimize the Spatial Development Process in a Smart City. 430-437 - Ayesha Anzer, Mourad Elhadef

:
A Multilayer Perceptron-Based Distributed Intrusion Detection System for Internet of Vehicles. 438-445
ECISeH Workshop II
- Alina Buzachis, Giuseppe Massimo Bernava

, Mario Busa
, Giovanni Pioggia
, Massimo Villari:
Towards the Basic Principles of Osmotic Computing: A Closed-Loop Gamified Cognitive Rehabilitation Flow Model. 446-452 - Li Yang, Yu Liang, Dalei Wu

, Jim Gault:
Train and Equip Firefighters with Cognitive Virtual and Augmented Reality. 453-459
ISCBD + I-CAPCHA Workshop
- Vishal Rathod, Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi

:
Semantically Rich, Context Aware Access Control for Openstack. 460-465 - Yogesh S. Kale

, Samantha E. Petrie, Marwan Bikdash, Michael D. Topal:
Cold-Start User-Based Weighted Collaborative Filtering for an Implicit Recommender System for Research Facilities. 466-471 - Lina Alfantoukh, Yefeng Ruan, Arjan Durresi:

Multi-Stakeholder Consensus Decision-Making Framework Based on Trust: A Generic Framework. 472-479 - Adya Joshi, Madan Oberoi, Ranjan Bose:

Analyzing CDR/IPDR Data to Find People Network from Encrypted Messaging Services. 480-486

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














