default search action
4th CSCloud 2017: New York, NY, USA
- 4th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2017, New York, NY, USA, June 26-28, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-6644-5
CSCloud 1
- Paul Young, Probha Madhavan, Gong-Do Hwang:
Power and Performance Study of HPC Applications on QCT Developer Cloud. 1-5 - Gong-Do Hwang, Stephen Chang:
Speed Up Weather Prediction on QCT Developer Cloud: A Case Study on Knights Landing Platform. 6-9 - Veda Shankar, Roscoe Lin:
Performance Study of Ceph Storage with Intel Cache Acceleration Software: Decoupling Hadoop MapReduce and HDFS over Ceph Storage. 10-13 - Chuan Zhou, Yuxiang Gao, Waylon Howard:
Evaluation of Combining Bootstrap with Multiple Imputation Using R on Knights Landing Platform. 14-17
CSCloud 2
- Prabha Madhavan, Paul Young, Stephen Chang:
Performance of Scientific Simulations on QCT Developer Cloud: A Case Study of Molecular Dynamic and Quantum Chemistry Simulations. 18-21 - Stephen Chang, Andy Pan:
Customized HPC Cluster Software Stack on QCT Developer Cloud. 22-26 - Yuxiang Gao, Wei-Min Chen:
Family Relationship Inference Using Knights Landing Platform. 27-30 - Yuxiang Gao, Tongling Zhang, Baijian Yang:
Finding the Best Box-Cox Transformation in Big Data with Meta-Model Learning: A Case Study on QCT Developer Cloud. 31-34 - Veda Shankar, Stephen Chang:
Performance of Caffe on QCT Deep Learning Reference Architecture - A Preliminary Case Study. 35-39
CSCloud 3
- Ting Sun, Chuangbai Xiao, Xiujie Xu, Guozhong Tian:
An Improved Budget-Deadline Constrained Workflow Scheduling Algorithm on Heterogeneous Resources. 40-45 - Abdulaziz Alshammari, Sulaiman Alhaidari, Ali Alharbi, Mohamed A. Zohdy:
Security Threats and Challenges in Cloud Computing. 46-51 - Rahul Katarya, Om Prakash Verma:
Privacy-Preserving and Secure Recommender System Enhance with K-NN and Social Tagging. 52-57 - Lili Zhang, Huibin Wang, Chenming Li, Yehong Shao, Qing Ye:
Unsupervised Anomaly Detection Algorithm of Graph Data Based on Graph Kernel. 58-63
CSCloud 4
- Keke Gai, Meikang Qiu, Yujun Li, Xiao-Yang Liu:
Advanced Fully Homomorphic Encryption Scheme Over Real Numbers. 64-69 - Jun Feng, Shengqiu Kong, Bingshuai Du, Jiamin Lu:
Research on Faceted Search Method for Water Data Catalogue Service. 70-75 - Hamza Djigal, Jun Feng, Jiamin Lu:
Secure Framework for Future Smart City. 76-83 - Weilian Su, Too Huseh Tien, Tri T. Ha:
Power Control Weakness in Long Term Evolution Network. 84-90
CSCloud 5
- Tianlin Li, Amish Mehta, Ping Yang:
Security Analysis of Email Systems. 91-96 - Tara Salman, Deval Bhamare, Aiman Erbad, Raj Jain, Mohammed Samaka:
Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments. 97-103 - Ming-Quan Hong, Wen-bo Zhao, Guang Chen, Chaoxian Chen, Zi-Yan Wang:
Quality Check and Analysis of BeiDou and GPS Observation Data in the Experiment of Air-Gun in Reservoir. 104-107 - Han Qiu, Gérard Memmi, Hassan Noura:
An Efficient Secure Storage Scheme Based on Information Fragmentation. 108-113
CSCloud 6
- Zecheng He, Tianwei Zhang, Ruby B. Lee:
Machine Learning Based DDoS Attack Detection from Source Side in Cloud. 114-120 - Vivek Agrawal, Adam Szekeres:
CIRA Perspective on Risks Within UnRizkNow - A Case Study. 121-126 - Risa Savold, Natalie Dagher, Preston Frazier, Dennis McCallam:
Architecting Cyber Defense: A Survey of the Leading Cyber Reference Architectures and Frameworks. 127-138
CSCloud 7
- Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati:
Distributed Shuffle Index in the Cloud: Implementation and Evaluation. 139-144 - Sathish A. P. Kumar, Brian Xu:
Vulnerability Assessment for Security in Aviation Cyber-Physical Systems. 145-150 - Bidyut Mukherjee, Roshan Lal Neupane, Prasad Calyam:
End-to-End IoT Security Middleware for Cloud-Fog Communication. 151-156 - Pethuru Raj Chelliah, Sathish A. P. Kumar:
A Cloud-Based Service Delivery Platform for Effective Homeland Security. 157-162
CSCloud 8
- Mohamed Yassin, Hakima Ould-Slimane, Chamseddine Talhi, Hanifa Boucheneb:
SQLIIDaaS: A SQL Injection Intrusion Detection Framework as a Service for SaaS Providers. 163-170 - Morgan Brattstrom, Patricia Morreale:
Scalable Agentless Cloud Network Monitoring. 171-176 - Weifeng Liu, Bin Gong, Meng Guo:
Improving the Energy Efficiency for Parallel Applications Running on Clusters. 177-186 - Keji Hu, Wensheng Zhang:
mPSI: Many-to-one Private Set Intersection. 187-192
CSCloud 9
- R. Can Aygun, Ali Gökhan Yavuz:
Network Anomaly Detection with Stochastically Improved Autoencoder Based Models. 193-198 - Obinna Igbe, Ihab Darwish, Tarek N. Saadawi:
Deterministic Dendritic Cell Algorithm Application to Smart Grid Cyber-Attack Detection. 199-204 - Sunhee Baek, Donghwoon Kwon, Jinoh Kim, Sang C. Suh, Hyunjoo Kim, Ikkyun Kim:
Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks. 205-210 - Wei Dai, Ibrahim Adel Ibrahim, Mostafa A. Bassiouni:
An Improved Straggler Identification Scheme for Data-Intensive Computing on Cloud Platforms. 211-216
CSCloud 10
- Reena Gunjan, Priyam Pandia, Rajeev Mohnot:
Secure Extraction of Image Data Based on Optimized Transform Method. 217-222 - Yujun Li, Kun Liang, Xiaojun Tang, Keke Gai:
Waveband Selection Based Feature Extraction Using Genetic Algorithm. 223-227 - Akram Y. Sarhan, Steve Carr:
A Highly-Secure Self-Protection Data Scheme in Clouds Using Active Data Bundles and Agent-Based Secure Multi-party Computation. 228-236 - Hongliang Liang, Yuying Wang, Huayang Cao, Jiajie Wang:
Fuzzing the Font Parser of Compound Documents. 237-242
CSCloud 11
- Hongliang Liang, Zhengyu Li, Minhuan Huang, Xiaoxiao Pei:
A Novel Method Makes Concolic System More Effective. 243-248 - Kepi Zhang, Tong Wu, Siyuan Chen, Linsen Cai, Chao Peng:
A New Energy Efficient VM Scheduling Algorithm for Cloud Computing Based on Dynamic Programming. 249-254 - Martin Ussath, David Jaeger, Feng Cheng, Christoph Meinel:
Identifying Suspicious User Behavior with Neural Networks. 255-263 - Vivek Agrawal:
A Framework for the Information Classification in ISO 27005 Standard. 264-269
CSCloud/SSC 12
- Wei Dai, Ibrahim Adel Ibrahim, Mostafa A. Bassiouni:
An Improved Replica Placement Policy for Hadoop Distributed File System Running on Cloud Platforms. 270-275 - Krishnendu Ghosh, William Casey, Jose Andre Morales, Bud Mishra:
Malware Fingerprinting under Uncertainty. 276-286 - Guanghui Zhu, Yunhui Zeng, Meng Guo:
A Security Analysis Method for Supercomputing Users' Behavior. 287-293 - Jie Shen, Ying Li, Bo Li, Hanteng Chen, Jianxin Li:
IoT Eye An Efficient System for Dynamic IoT Devices Auto-discovery on Organization Level. 294-299 - Sukun Li, Avery Leider, Meikang Qiu, Keke Gai, Meiqin Liu:
Brain-Based Computer Interfaces in Virtual Reality. 300-305
CSCloud 13
- Alireza Kavianpour, Michael C. Anderson:
An Overview of Wireless Network Security. 306-309 - Junjie Hou, Yongxin Zhu, Yulan Shen, Mengjun Li, Qian Wu, Han Wu:
Enhancing Precision and Bandwidth in Cloud Computing: Implementation of a Novel Floating-Point Format on FPGA. 310-315 - Dmita Levy, Hardik A. Gohel, Himanshu Upadhyay, Alexander Perez-Pons, Leonel E. Lagos:
Design of Virtualization Framework to Detect Cyber Threats in Linux Environment. 316-320 - Yingchi Mao, Hai Qi, Xiaoli Chen, Xiaofang Li:
Event Detection with Multivariate Water Parameters in the Water Monitoring Applications. 321-326
CSCloud 14
- Vijey Thayananthan, Omar A. Abdulkader, Kamal Mansur Jambi, Alwi M. Bamhdi:
Analysis of Cybersecurity Based on Li-Fi in Green Data Storage Environments. 327-332 - Alexander Fromm, Vladislav Stepa:
HDFT++ Hybrid Data Flow Tracking for SaaS Cloud Services. 333-338 - Zhenya Chen, Ying Yang, Lijuan Chen, Liqiang Wen, Jizhi Wang, Guang Yang, Meng Guo:
Email Visualization Correlation Analysis Forensics Research. 339-343 - Mohammad A. A. Alhawamdeh:
Developing a Conceptual National Information Sharing Security Framework to Combat Cybercrimes in Jordan. 344-350
CSCloud 15
- Vivek Vijay Sarkale, Paul Rad, Wonjun Lee:
Secure Cloud Container: Runtime Behavior Monitoring Using Most Privileged Container (MPC). 351-356 - Rajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya:
Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC. 357-362 - Art Sedighi, Milton Smith, Yuefen Deng:
FUD - Balancing Scheduling Parameters in Shared Computing Environments. 363-368 - Arya Sahadevan, Deepa Mathew, Jairam Mookathana, Bijoy Antony Jose:
An Offline Online Strategy for IoT Using MQTT. 369-373
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.