


default search action
MONAMI 2017: Melbourne, Australia
- Jiankun Hu, Ibrahim Khalil

, Zahir Tari
, Sheng Wen:
Mobile Networks and Management - 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 235, Springer 2018, ISBN 978-3-319-90774-1 - Ben Quinton, Neda Aboutorab

:
Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications. 1-13 - Efthimios Alepis, Constantinos Patsakis:

Persistent vs Service IDs in Android: Session Fingerprinting from Apps. 14-29 - Nickolaos Koroniotis, Nour Moustafa

, Elena Sitnikova
, Jill Slay
:
Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques. 30-44 - C. P. Sona

, Jaison Paul Mulerikkal
:
Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework. 45-55 - Yanming Zhu

, Xuefei Yin
, Jiankun Hu
:
Robust Fingerprint Matching Based on Convolutional Neural Networks. 56-65 - Xue Tian, Peisong Shen

, Tengfei Yang, Chi Chen
, Jiankun Hu
:
A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data. 66-78 - Zhaohua Zhou, Shi Shi, Shunan Ma, Jing Fu:

Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling. 79-86 - Rizza T. Loquias

, Nestor Michael C. Tiglao
, Jhoanna Rhodette I. Pedrasa, Joel Joseph S. Marciano:
Factor Effects for Routing in a Delay-Tolerant Wireless Sensor Network for Lake Environment Monitoring. 87-100 - Yen Hong Tran, Quang Nhat Tran:

Estimating Public Opinion in Social Media Content Using Aspect-Based Opinion Mining. 101-115 - Nam Nhat Tran, Ruhul A. Sarker

, Jiankun Hu
:
An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural Network. 116-126 - Xuefei Yin

, Yanming Zhu
, Jiankun Hu
:
A Robust Contactless Fingerprint Enhancement Algorithm. 127-136 - Waqas Haider, Jiankun Hu

, Nour Moustafa
:
Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning. 137-149 - Tiong-Sik Ng

, Syh-Yuan Tan
, Ji-Jian Chin
:
A Variant of BLS Signature Scheme with Tight Security Reduction. 150-163 - Fei Li, Ying Guo, Jiankun Hu

:
Quantum Authentication Scheme Based on Fingerprint-Encoded Graph States. 164-177 - Abdelaziz Bouras, Houssem Gasmi, Fadi Ghemri:

Cooperative Information Security/Cybersecurity Curriculum Development. 178-187 - Emna Baccour, Ala Gouissem, Sebti Foufou, Ridha Hamila, Zahir Tari, Albert Y. Zomaya

:
An Energy Saving Mechanism Based on Vacation Queuing Theory in Data Center Networks. 188-202 - Hamid Usefi, Sudharaka Palamakumbura:

Homomorphic Evaluation of Database Queries. 203-216 - Melchizedek I. Alipio

, Nestor Michael C. Tiglao
:
A Cache-Aware Congestion Control for Reliable Transport in Wireless Sensor Networks. 217-230 - Mouza Ahmed Bani Shemaili, Chan Yeob Yeun

, Mohamed Jamal Zemerly
, Khalid Mubarak
, Hyun Ku Yeun, Yoon Seok Chang, Basim Zafar, Mohammed Simsim, Yasir Salih, Gaemyoung Lee:
A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources. 231-246 - Andrzej M. Goscinski, Zahir Tari, Izzatdin Abdul Aziz

, Eidah J. Alzahrani
:
Fog Computing as a Critical Link Between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs. 247-261 - Lukas Iffländer

, Christopher Metter, Florian Wamser, Phuoc Tran-Gia, Samuel Kounev:
Performance Assessment of Cloud Migrations from Network and Application Point of View. 262-276 - Zifan Liu, Qing Cai, Song Wang, Xiaolong Xu

, Wanchun Dou, Shui Yu
:
A Cloud Service Enhanced Method Supporting Context-Aware Applications. 277-290 - Wencheng Yang

, Guanglou Zheng, Ahmed Ibrahim
, Junaid Ahsenali Chaudhry, Song Wang
, Jiankun Hu
, Craig Valli
:
Application of 3D Delaunay Triangulation in Fingerprint Authentication System. 291-298 - Binrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma

:
The Public Verifiability of Public Key Encryption with Keyword Search. 299-312 - Baokun Zheng, Liehuang Zhu, Meng Shen

, Xiaojiang Du, Jing Yang, Feng Gao, Yandong Li, Chuan Zhang, Sheng Liu, Shu Yin:
Malicious Bitcoin Transaction Tracing Using Incidence Relation Clustering. 313-323 - Kakumani K. C. Deepthi, Kunwar Singh:

Cryptanalysis of Salsa and ChaCha: Revisited. 324-338 - Yandong Li, Liehuang Zhu, Meng Shen

, Feng Gao, Baokun Zheng, Xiaojiang Du, Sheng Liu, Shu Yin:
CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains. 339-352 - Thomas Marsden, Nour Moustafa

, Elena Sitnikova
, Gideon Creech:
Probability Risk Identification Based Intrusion Detection System for SCADA Systems. 353-363 - Sibghat Ullah Bazai

, Julian Jang-Jaccard
, Ruili Wang
:
Anonymizing k-NN Classification on MapReduce. 364-377 - Zhe Jin

, Jung Yeon Hwang, Soohyung Kim, Sangrae Cho, Yen-Lung Lai, Andrew Beng Jin Teoh
:
A Cancellable Ranking Based Hashing Method for Fingerprint Template Protection. 378-389

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














