default search action
MONAMI 2017: Melbourne, Australia
- Jiankun Hu, Ibrahim Khalil, Zahir Tari, Sheng Wen:
Mobile Networks and Management - 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 235, Springer 2018, ISBN 978-3-319-90774-1 - Ben Quinton, Neda Aboutorab:
Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications. 1-13 - Efthimios Alepis, Constantinos Patsakis:
Persistent vs Service IDs in Android: Session Fingerprinting from Apps. 14-29 - Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay:
Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques. 30-44 - C. P. Sona, Jaison Paul Mulerikkal:
Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework. 45-55 - Yanming Zhu, Xuefei Yin, Jiankun Hu:
Robust Fingerprint Matching Based on Convolutional Neural Networks. 56-65 - Xue Tian, Peisong Shen, Tengfei Yang, Chi Chen, Jiankun Hu:
A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data. 66-78 - Zhaohua Zhou, Shi Shi, Shunan Ma, Jing Fu:
Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling. 79-86 - Rizza T. Loquias, Nestor Michael C. Tiglao, Jhoanna Rhodette I. Pedrasa, Joel Joseph S. Marciano:
Factor Effects for Routing in a Delay-Tolerant Wireless Sensor Network for Lake Environment Monitoring. 87-100 - Yen Hong Tran, Quang Nhat Tran:
Estimating Public Opinion in Social Media Content Using Aspect-Based Opinion Mining. 101-115 - Nam Nhat Tran, Ruhul A. Sarker, Jiankun Hu:
An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural Network. 116-126 - Xuefei Yin, Yanming Zhu, Jiankun Hu:
A Robust Contactless Fingerprint Enhancement Algorithm. 127-136 - Waqas Haider, Jiankun Hu, Nour Moustafa:
Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning. 137-149 - Tiong-Sik Ng, Syh-Yuan Tan, Ji-Jian Chin:
A Variant of BLS Signature Scheme with Tight Security Reduction. 150-163 - Fei Li, Ying Guo, Jiankun Hu:
Quantum Authentication Scheme Based on Fingerprint-Encoded Graph States. 164-177 - Abdelaziz Bouras, Houssem Gasmi, Fadi Ghemri:
Cooperative Information Security/Cybersecurity Curriculum Development. 178-187 - Emna Baccour, Ala Gouissem, Sebti Foufou, Ridha Hamila, Zahir Tari, Albert Y. Zomaya:
An Energy Saving Mechanism Based on Vacation Queuing Theory in Data Center Networks. 188-202 - Hamid Usefi, Sudharaka Palamakumbura:
Homomorphic Evaluation of Database Queries. 203-216 - Melchizedek I. Alipio, Nestor Michael C. Tiglao:
A Cache-Aware Congestion Control for Reliable Transport in Wireless Sensor Networks. 217-230 - Mouza Ahmed Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly, Khalid Mubarak, Hyun Ku Yeun, Yoon Seok Chang, Basim Zafar, Mohammed Simsim, Yasir Salih, Gaemyoung Lee:
A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources. 231-246 - Andrzej M. Goscinski, Zahir Tari, Izzatdin Abdul Aziz, Eidah J. Alzahrani:
Fog Computing as a Critical Link Between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs. 247-261 - Lukas Iffländer, Christopher Metter, Florian Wamser, Phuoc Tran-Gia, Samuel Kounev:
Performance Assessment of Cloud Migrations from Network and Application Point of View. 262-276 - Zifan Liu, Qing Cai, Song Wang, Xiaolong Xu, Wanchun Dou, Shui Yu:
A Cloud Service Enhanced Method Supporting Context-Aware Applications. 277-290 - Wencheng Yang, Guanglou Zheng, Ahmed Ibrahim, Junaid Ahsenali Chaudhry, Song Wang, Jiankun Hu, Craig Valli:
Application of 3D Delaunay Triangulation in Fingerprint Authentication System. 291-298 - Binrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma:
The Public Verifiability of Public Key Encryption with Keyword Search. 299-312 - Baokun Zheng, Liehuang Zhu, Meng Shen, Xiaojiang Du, Jing Yang, Feng Gao, Yandong Li, Chuan Zhang, Sheng Liu, Shu Yin:
Malicious Bitcoin Transaction Tracing Using Incidence Relation Clustering. 313-323 - Kakumani K. C. Deepthi, Kunwar Singh:
Cryptanalysis of Salsa and ChaCha: Revisited. 324-338 - Yandong Li, Liehuang Zhu, Meng Shen, Feng Gao, Baokun Zheng, Xiaojiang Du, Sheng Liu, Shu Yin:
CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains. 339-352 - Thomas Marsden, Nour Moustafa, Elena Sitnikova, Gideon Creech:
Probability Risk Identification Based Intrusion Detection System for SCADA Systems. 353-363 - Sibghat Ullah Bazai, Julian Jang-Jaccard, Ruili Wang:
Anonymizing k-NN Classification on MapReduce. 364-377 - Zhe Jin, Jung Yeon Hwang, Soohyung Kim, Sangrae Cho, Yen-Lung Lai, Andrew Beng Jin Teoh:
A Cancellable Ranking Based Hashing Method for Fingerprint Template Protection. 378-389
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.