


default search action
4th CSCloud 2017: New York, NY, USA
- 4th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2017, New York, NY, USA, June 26-28, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-6644-5

CSCloud 1
- Paul Young, Probha Madhavan, Gong-Do Hwang:

Power and Performance Study of HPC Applications on QCT Developer Cloud. 1-5 - Gong-Do Hwang, Stephen Chang:

Speed Up Weather Prediction on QCT Developer Cloud: A Case Study on Knights Landing Platform. 6-9 - Veda Shankar, Roscoe Lin:

Performance Study of Ceph Storage with Intel Cache Acceleration Software: Decoupling Hadoop MapReduce and HDFS over Ceph Storage. 10-13 - Chuan Zhou, Yuxiang Gao, Waylon Howard

:
Evaluation of Combining Bootstrap with Multiple Imputation Using R on Knights Landing Platform. 14-17
CSCloud 2
- Prabha Madhavan, Paul Young, Stephen Chang:

Performance of Scientific Simulations on QCT Developer Cloud: A Case Study of Molecular Dynamic and Quantum Chemistry Simulations. 18-21 - Stephen Chang, Andy Pan:

Customized HPC Cluster Software Stack on QCT Developer Cloud. 22-26 - Yuxiang Gao, Wei-Min Chen:

Family Relationship Inference Using Knights Landing Platform. 27-30 - Yuxiang Gao, Tongling Zhang, Baijian Yang

:
Finding the Best Box-Cox Transformation in Big Data with Meta-Model Learning: A Case Study on QCT Developer Cloud. 31-34 - Veda Shankar, Stephen Chang:

Performance of Caffe on QCT Deep Learning Reference Architecture - A Preliminary Case Study. 35-39
CSCloud 3
- Ting Sun, Chuangbai Xiao, Xiujie Xu, Guozhong Tian:

An Improved Budget-Deadline Constrained Workflow Scheduling Algorithm on Heterogeneous Resources. 40-45 - Abdulaziz Alshammari, Sulaiman Alhaidari, Ali Alharbi, Mohamed A. Zohdy:

Security Threats and Challenges in Cloud Computing. 46-51 - Rahul Katarya, Om Prakash Verma:

Privacy-Preserving and Secure Recommender System Enhance with K-NN and Social Tagging. 52-57 - Lili Zhang, Huibin Wang, Chenming Li, Yehong Shao, Qing Ye:

Unsupervised Anomaly Detection Algorithm of Graph Data Based on Graph Kernel. 58-63
CSCloud 4
- Keke Gai

, Meikang Qiu, Yujun Li, Xiao-Yang Liu:
Advanced Fully Homomorphic Encryption Scheme Over Real Numbers. 64-69 - Jun Feng

, Shengqiu Kong, Bingshuai Du, Jiamin Lu
:
Research on Faceted Search Method for Water Data Catalogue Service. 70-75 - Hamza Djigal

, Jun Feng
, Jiamin Lu
:
Secure Framework for Future Smart City. 76-83 - Weilian Su, Too Huseh Tien, Tri T. Ha:

Power Control Weakness in Long Term Evolution Network. 84-90
CSCloud 5
- Tianlin Li, Amish Mehta, Ping Yang:

Security Analysis of Email Systems. 91-96 - Tara Salman

, Deval Bhamare, Aiman Erbad
, Raj Jain, Mohammed Samaka:
Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments. 97-103 - Ming-Quan Hong, Wen-bo Zhao, Guang Chen, Chaoxian Chen, Zi-Yan Wang:

Quality Check and Analysis of BeiDou and GPS Observation Data in the Experiment of Air-Gun in Reservoir. 104-107 - Han Qiu

, Gérard Memmi, Hassan Noura
:
An Efficient Secure Storage Scheme Based on Information Fragmentation. 108-113
CSCloud 6
- Zecheng He, Tianwei Zhang, Ruby B. Lee:

Machine Learning Based DDoS Attack Detection from Source Side in Cloud. 114-120 - Vivek Agrawal, Adam Szekeres

:
CIRA Perspective on Risks Within UnRizkNow - A Case Study. 121-126 - Risa Savold, Natalie Dagher, Preston Frazier, Dennis McCallam:

Architecting Cyber Defense: A Survey of the Leading Cyber Reference Architectures and Frameworks. 127-138
CSCloud 7
- Enrico Bacis

, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa
, Pierangela Samarati:
Distributed Shuffle Index in the Cloud: Implementation and Evaluation. 139-144 - Sathish A. P. Kumar, Brian Xu:

Vulnerability Assessment for Security in Aviation Cyber-Physical Systems. 145-150 - Bidyut Mukherjee

, Roshan Lal Neupane, Prasad Calyam:
End-to-End IoT Security Middleware for Cloud-Fog Communication. 151-156 - Pethuru Raj Chelliah, Sathish A. P. Kumar:

A Cloud-Based Service Delivery Platform for Effective Homeland Security. 157-162
CSCloud 8
- Mohamed Yassin

, Hakima Ould-Slimane, Chamseddine Talhi, Hanifa Boucheneb:
SQLIIDaaS: A SQL Injection Intrusion Detection Framework as a Service for SaaS Providers. 163-170 - Morgan Brattstrom, Patricia Morreale

:
Scalable Agentless Cloud Network Monitoring. 171-176 - Weifeng Liu, Bin Gong, Meng Guo:

Improving the Energy Efficiency for Parallel Applications Running on Clusters. 177-186 - Keji Hu, Wensheng Zhang:

mPSI: Many-to-one Private Set Intersection. 187-192
CSCloud 9
- R. Can Aygun, Ali Gökhan Yavuz

:
Network Anomaly Detection with Stochastically Improved Autoencoder Based Models. 193-198 - Obinna Igbe, Ihab Darwish, Tarek N. Saadawi:

Deterministic Dendritic Cell Algorithm Application to Smart Grid Cyber-Attack Detection. 199-204 - Sunhee Baek, Donghwoon Kwon, Jinoh Kim, Sang C. Suh, Hyunjoo Kim, Ikkyun Kim:

Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks. 205-210 - Wei Dai, Ibrahim Adel Ibrahim

, Mostafa A. Bassiouni:
An Improved Straggler Identification Scheme for Data-Intensive Computing on Cloud Platforms. 211-216
CSCloud 10
- Reena Gunjan, Priyam Pandia, Rajeev Mohnot:

Secure Extraction of Image Data Based on Optimized Transform Method. 217-222 - Yujun Li, Kun Liang, Xiaojun Tang, Keke Gai

:
Waveband Selection Based Feature Extraction Using Genetic Algorithm. 223-227 - Akram Y. Sarhan

, Steve Carr
:
A Highly-Secure Self-Protection Data Scheme in Clouds Using Active Data Bundles and Agent-Based Secure Multi-party Computation. 228-236 - Hongliang Liang, Yuying Wang, Huayang Cao, Jiajie Wang:

Fuzzing the Font Parser of Compound Documents. 237-242
CSCloud 11
- Hongliang Liang, Zhengyu Li, Minhuan Huang, Xiaoxiao Pei:

A Novel Method Makes Concolic System More Effective. 243-248 - Kepi Zhang, Tong Wu, Siyuan Chen, Linsen Cai, Chao Peng:

A New Energy Efficient VM Scheduling Algorithm for Cloud Computing Based on Dynamic Programming. 249-254 - Martin Ussath, David Jaeger

, Feng Cheng, Christoph Meinel:
Identifying Suspicious User Behavior with Neural Networks. 255-263 - Vivek Agrawal:

A Framework for the Information Classification in ISO 27005 Standard. 264-269
CSCloud/SSC 12
- Wei Dai, Ibrahim Adel Ibrahim

, Mostafa A. Bassiouni:
An Improved Replica Placement Policy for Hadoop Distributed File System Running on Cloud Platforms. 270-275 - Krishnendu Ghosh, William Casey, Jose Andre Morales, Bud Mishra:

Malware Fingerprinting under Uncertainty. 276-286 - Guanghui Zhu, Yunhui Zeng, Meng Guo:

A Security Analysis Method for Supercomputing Users' Behavior. 287-293 - Jie Shen, Ying Li, Bo Li, Hanteng Chen, Jianxin Li:

IoT Eye An Efficient System for Dynamic IoT Devices Auto-discovery on Organization Level. 294-299 - Sukun Li

, Avery Leider, Meikang Qiu, Keke Gai
, Meiqin Liu:
Brain-Based Computer Interfaces in Virtual Reality. 300-305
CSCloud 13
- Alireza Kavianpour, Michael C. Anderson:

An Overview of Wireless Network Security. 306-309 - Junjie Hou, Yongxin Zhu, Yulan Shen, Mengjun Li, Qian Wu, Han Wu:

Enhancing Precision and Bandwidth in Cloud Computing: Implementation of a Novel Floating-Point Format on FPGA. 310-315 - Dmita Levy, Hardik A. Gohel

, Himanshu Upadhyay, Alexander Perez-Pons
, Leonel E. Lagos
:
Design of Virtualization Framework to Detect Cyber Threats in Linux Environment. 316-320 - Yingchi Mao, Hai Qi, Xiaoli Chen, Xiaofang Li:

Event Detection with Multivariate Water Parameters in the Water Monitoring Applications. 321-326
CSCloud 14
- Vijey Thayananthan, Omar A. Abdulkader

, Kamal Mansur Jambi, Alwi M. Bamhdi:
Analysis of Cybersecurity Based on Li-Fi in Green Data Storage Environments. 327-332 - Alexander Fromm, Vladislav Stepa:

HDFT++ Hybrid Data Flow Tracking for SaaS Cloud Services. 333-338 - Zhenya Chen, Ying Yang, Lijuan Chen, Liqiang Wen, Jizhi Wang, Guang Yang, Meng Guo:

Email Visualization Correlation Analysis Forensics Research. 339-343 - Mohammad A. A. Alhawamdeh:

Developing a Conceptual National Information Sharing Security Framework to Combat Cybercrimes in Jordan. 344-350
CSCloud 15
- Vivek Vijay Sarkale, Paul Rad, Wonjun Lee:

Secure Cloud Container: Runtime Behavior Monitoring Using Most Privileged Container (MPC). 351-356 - Rajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya:

Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC. 357-362 - Art Sedighi, Milton Smith, Yuefen Deng:

FUD - Balancing Scheduling Parameters in Shared Computing Environments. 363-368 - Arya Sahadevan, Deepa Mathew, Jairam Mookathana, Bijoy Antony Jose:

An Offline Online Strategy for IoT Using MQTT. 369-373

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














