


default search action
11th SpaCCS 2018: Melbourne, NSW, Australia
- Guojun Wang, Jinjun Chen, Laurence T. Yang:

Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings. Lecture Notes in Computer Science 11342, Springer 2018, ISBN 978-3-030-05344-4
The 11th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2018)
- Huiyong Li, Jiannan Yu, Qian Cao:

Protecting Your Smartphone from Theft Using Accelerometer. 3-14 - Savio Sciancalepore

, Roberto Di Pietro
:
SOS - Securing Open Skies. 15-32 - Michael Sonntag

:
DNS Traffic of a Tor Exit Node - An Analysis. 33-45 - Muhammad Arif, Guojun Wang, Tian Wang

, Tao Peng:
SDN-Based Secure VANETs Communication with Fog Computing. 46-59 - Sarah McNary, Aaron Hunter:

Wearable Device Data for Criminal Investigation. 60-71 - Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu:

Authentication of Skyline Query over Road Networks. 72-83 - Syed Qasim Afser Rizvi, Guojun Wang, Jianer Chen:

A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing. 84-97 - Yasir Nawaz, Lei Wang, Kamel Ammour:

Processing Analysis of Confidential Modes of Operation. 98-110
The 4th International Symposium on Sensor-Cloud Systems (SCS 2018)
- Xingsi Xue, Shijian Liu:

Matching Sensor Ontologies Through Compact Evolutionary Tabu Search Algorithm. 115-124 - Yunji Li, Li Peng, Xuefang Zhu, Wen Li:

Event-Triggered Fault-Detection Filter Using Coordinate Transformation Approach for Time-Varying Stochastic Systems. 125-135 - Zhuoshi Yang, Yanxiang Wang, Lejun Zhang, Yiran Shen:

Indoor Interference Classification Based on WiFi Channel State Information. 136-145 - Ahmed Raad Al-Sudani

, Shang Gao, Sheng Wen, Muhmmad Al-Khiza'ay
:
Secure and Privacy Preserving RFID Based Access Control to Smart Buildings. 146-155 - Mohan Li, Yu Jiang, Yanbin Sun, Zhihong Tian:

Answering the Min-Cost Quality-Aware Query on Multi-sources in Sensor-Cloud Systems. 156-165 - Kai Peng

, Lixin Zheng, Xiaolong Xu
, Tao Lin, Victor C. M. Leung
:
Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment. 166-177 - Jingbo Xia, Jian Shen, Yaoxiang Wu:

A Four-Stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Coverage. 178-191 - Chaogang Tang, Xianglin Wei, Jin Liu:

Application of Sensor-Cloud Systems: Smart Traffic Control. 192-202 - Wei Song, Min Li, Shun You:

Strategy-Proof Mechanism for Provisioning Non-obedient Resources Without Payment. 203-213
The 4th International Symposium on Dependability in Sensor, Cloud and Big Data Systems and Applications (DependSys 2018)
- Abdullah Ali Salamai

, Morteza Saberi
, Md. Omar Khadeer Hussain
, Elizabeth Chang
:
Risk Identification-Based Association Rule Mining for Supply Chain Big Data. 219-228 - Xuan Zhao, Md. Zakirul Alam Bhuiyan, Lianyong Qi, Hongli Nie, Wajid Rafique

, Wanchun Dou:
TrCMP: An App Usage Inference Method for Mobile Service Enhancement. 229-239 - Shuo Zhang, Ningjiang Chen, Hanlin Zhang, Yijun Xue, Ruwei Huang:

A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replication. 240-250 - Musaddiq Majid Khan Al-Nadwi, Nadia Refat, Nafees Zaman

, Md. Arafatur Rahman
, Md. Zakirul Alam Bhuiyan, Ramdan Bin Razali:
Cloud Enabled e-Glossary System: A Smart Campus Perspective. 251-260 - Rongyu He, Haonan Sun, Yong Zhang:

A Dynamic Integrity Transitivity Model for the Cloud. 261-271 - Hira Zahid

, Tariq Mahmood, Nassar Ikram:
Enhancing Dependability in Big Data Analytics Enterprise Pipelines. 272-281 - Wang Wei, Md. Arafatur Rahman

, Md Jahan Ali
, Md. Zakirul Alam Bhuiyan, Liu Yao, Hai Tao
:
Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective. 282-293 - Maisha Afrida Tasnim, Abdullah Al Omar

, Mohammad Shahriar Rahman
, Md. Zakirul Alam Bhuiyan:
CRAB: Blockchain Based Criminal Record Management System. 294-303 - Usman Ahmad, Hong Song, Awais Bilal, Mamoun Alazab

, Alireza Jolfaei
:
Secure Passive Keyless Entry and Start System Using Machine Learning. 304-313
The 10th International Symposium on UbiSafe Computing (UbiSafe 2018)
- Itishree Mohallick, Katrien De Moor

, Özlem Özgöbek
, Jon Atle Gulla:
Towards New Privacy Regulations in Europe: Users' Privacy Perception in Recommender Systems. 319-330 - Shangfo Huang, Weifeng Lv, Zhipu Xie, Bo Huang, Bowen Du:

SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing. 331-340 - Bo Huang, Guixi Xiong, Zhipu Xie, Shangfo Huang, Bowen Du:

NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion. 341-350 - Jingyue Yang, Haiquan Wang, Zhaoyi Wang, Jieyi Long, Bowen Du:

BDCP: A Framework for Big Data Copyright Protection Based on Digital Watermarking. 351-360 - Yang Xu, Quanrun Zeng, Guojun Wang, Cheng Zhang, Ju Ren, Yaoxue Zhang:

A Privacy-Preserving Attribute-Based Access Control Scheme. 361-370 - Ahmed Raad Al-Sudani

, Shang Gao, Sheng Wen, Muhmmad Al-Khiza'ay
:
Checking an Authentication of Person Depends on RFID with Thermal Image. 371-380 - Kasra Majbouri Yazdi, Adel Majbouri Yazdi, Saeid Khodayi, Jingyu Hou, Wanlei Zhou

, Saeed Saedy:
Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks. 381-391 - Zuojie Deng, Shuhong Chen

, Xiaolan Tan, Dan Song, Fan Wu:
An Efficient Provable Multi-copy Data Possession Scheme with Data Dynamics. 392-402
The 7th International Symposium on Security and Privacy on Internet of Things (SPIoT 2018)
- Jialuo Han, Jidong Wang:

An Enhanced Key Management Scheme for LoRaWAN. 407-416 - Pascal Oser

, Frank Kargl
, Stefan Lüders
:
Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics. 417-427 - Shafiq-Ur Rehman, Volker Gruhn, Saad Shafiq

, Irum Inayat:
A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems. 428-442 - Nikos Fotiou, Vasilios A. Siris

, George C. Polyzos
:
Interacting with the Internet of Things Using Smart Contracts and Blockchain Technologies. 443-452
The 9th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2018)
- Senlin Wang, Junhai Zhou, Qin Liu, Zheng Qin, Panlin Hou:

Research on Multi-focus Image Fusion Algorithm Based on Quadtree. 457-464 - Xiaoping Ren, Fang Nan, Jian Wang:

Uncertainty Evaluation for Big Data of Mass Standards in a Key Comparison. 465-471 - Heng Xiao, Xianchun Zhou, Yue Tian:

Research on Wireless Spectrum Sensing Technology Based on Machine Learning. 472-479
The 10th International Workshop on Security in e-Science and e-Research (ISSR 2018)
- Jie Tao, Shaobo Zhang, Dalian Yang:

The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning. 485-496 - Xiaodan Yan, Baojiang Cui, Jianbin Li:

Malicious Domain Name Recognition Based on Deep Neural Networks. 497-505
The 8th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2018)
- Md. Zakirul Alam Bhuiyan

, Md. Monirul Islam, Guojun Wang
, Tian Wang
:
Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals. 511-521 - Liang Liu, Zhe Xu, Yi-Ting Wang, Xiaolin Qin:

E ^2 STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks. 522-531

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














