Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CIC
CIC 2018
Generate Citations
2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC)
Oct. 18 2018 to Oct. 20 2018
Philadelphia, PA, USA
Table of Contents
[Title page i]
Freely available from IEEE.
pp. 1-1
[Title page iii]
Freely available from IEEE.
pp. 3-3
[Copyright notice]
Freely available from IEEE.
pp. 4-4
Table of contents
Freely available from IEEE.
pp. 5-11
Message from the CIC 2018 General Co-Chairs
Freely available from IEEE.
pp. 12-13
Message from the CIC 2018 Program Co-Chairs
Freely available from IEEE.
pp. 14-15
CIC 2018 Organizing Committee
Freely available from IEEE.
pp. 16-16
CIC 2018 Steering Committee
Freely available from IEEE.
pp. 17-17
CIC 2018 Technical Committee
Freely available from IEEE.
pp. 18-18
CIC 2018 External Reviewers and Subreviewers
Freely available from IEEE.
pp. 19-19
CIC 2018 Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-24
CIC 2018 Tutorials
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-33
AutoBotCatcher: Blockchain-Based P2P Botnet Detection for the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Gokhan Sagirlar
,
Barbara Carminati
,
Elena Ferrari
Blockchain-Based PKI Solutions for IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-15
by
Ankush Singla
,
Elisa Bertino
Monitor: An Abnormality Detection Approach in Buildings Energy Consumption
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-25
by
Haroon Rashid
,
Pushpendra Singh
Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-35
by
Jongho Won
,
Elisa Bertino
Link-Sign Prediction in Dynamic Signed Directed Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-45
by
Quang-Vinh Dang
,
Claudia-Lavinia Ignat
Mining the Best Observational Window to Model Social Phenomena
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-55
by
Chao Yan
,
Zhijun Yin
,
Stanley Xiang
,
You Chen
,
Yevgeniy Vorobeychik
,
Daniel Fabbri
,
Abel Kho
,
David Liebovitz
,
Bradley Malin
Investigating Aspects of Platform Growth on Crowdsource Driven Recommendation Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-63
by
Julian Jarrett
,
M. Brian Blake
Parallel Schedule of Live Migrations for Virtual Machine Placements
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-70
by
M.P. Gilesh
,
Sanjay Satheesh
,
Athul Chandran
,
S.D. Madhu Kumar
,
Lillykutty Jacob
Link-Quality and Traffic-Load Aware Routing for UAV Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-79
by
Cong Pu
Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face of an Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-89
by
Jagannadh Vempati
,
Ram Dantu
A Decentralized Marketplace Application on the Ethereum Blockchain
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-97
by
Vishnu Prasad Ranganthan
,
Ram Dantu
,
Aditya Paul
,
Paula Mears
,
Kirill Morozov
A QoS Framework for SDN-Based Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-105
by
Haitham Ghalwash
,
Chun-Hsi Huang
Lightweight Web Services Migration Framework in Hybrid Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-113
by
Alaeddine Saadaoui
,
Stephen L. Scott
Collaborative and Accountable Hardware Governance Using Blockchain
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-121
by
Ashish Kundu
,
Zehra Sura
,
Upendra Sharma
Blockchain as a Platform for Secure Inter-Organizational Business Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-129
by
Barbara Carminati
,
Elena Ferrari
,
Christian Rondanini
Towards Modernizing the Future of American Voting
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-135
by
LeRoy Carr
,
Anthony J. Newtson
,
James Joshi
RIPA: Real-Time Image Privacy Alert System
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-145
by
Dakshak Keerthi Chandra
,
Weerdhawal Chowgule
,
Yanjie Fu
,
Dan Lin
Detection of Temporal Data Ex-Filtration Threats to Relational Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-155
by
Asmaa Sallam
,
Elisa Bertino
Prunable Authenticated Log and Authenticable Snapshot in Distributed Collaborative Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-165
by
Victorien Elvinger
,
Gérald Oster
,
Francois Charoy
Context-Aware Deep Learning-Driven Framework for Mitigation of Security Risks in BYOD-Enabled Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-175
by
Daniel Petrov
,
Taieb Znati
Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-187
by
Daniele Enrico Asoni
,
Takayuki Sasaki
,
Adrian Perrig
Supporting Virtual Organizations Using Attribute-Based Encryption in Named Data Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-196
by
Craig A. Lee
,
Zhiyi Zhang
,
Yukai Tu
,
Alex Afanasyev
,
Lixia Zhang
The Impact of Malicious Accounts on Political Tweet Sentiment
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-202
by
Brian Heredia
,
Joseph D. Prusa
,
Taghi M. Khoshgoftaar
Policy and Resource Orchestration in Software-Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-206
by
Anduo Wang
,
Jie Wu
Facilitating Data-Centric Recommendation in Knowledge Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-216
by
Jia Zhang
,
Maryam Pourreza
,
Rahul Ramachandran
,
Tsengdar J. Lee
,
Patrick Gatlin
,
Manil Maskey
,
Amanda Marie Weigel
New Algorithms and Methods for Collaborative Co-Editing Using HTML DOM Synchronization
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-226
by
Cristian Gadea
,
Bogdan Ionescu
,
Dan Ionescu
A Teacher Dashboard for Real-Time Intervention
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-235
by
Sebastián Hernández
,
Nelson Baloian
,
José A. Pino
,
Xiaojun Yuan
Automated Threat Report Classification over Multi-Source Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-245
by
Gbadebo Ayoade
,
Swarup Chandra
,
Latifur Khan
,
Kevin Hamlen
,
Bhavani Thuraisingham
Transfer Learning of Deep Neural Networks for Visual Collaborative Maritime Asset Identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-255
by
Nicholas Warren
,
Benjamin Garrard
,
Elliot Staudt
,
Jelena Tesic
Smart Surveillance as an Edge Network Service: From Harr-Cascade, SVM to a Lightweight CNN
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-265
by
Seyed Yahya Nikouei
,
Yu Chen
,
Sejun Song
,
Ronghua Xu
,
Baek-Young Choi
,
Timothy Faughnan
Envisioning an Information Assurance and Performance Infrastructure for the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-271
by
Jamie Payton
,
Xiaojiang Du
,
Xubin He
,
Jie Wu
MEDUSA: Malware Detection Using Statistical Analysis of System's Behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-278
by
Muhammad Ejaz Ahmed
,
Surya Nepal
,
Hyoungshick Kim
Next Generation Trustworthy Fraud Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-282
by
Sihong Xie
,
Philip S. Yu
Storage Service Orchestration with Container Elasticity
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-292
by
Amit Warke
,
Mohamed Mohamed
,
Robert Engel
,
Heiko Ludwig
,
Wayne Sawdon
,
Ling Liu
Predictive Modeling with Vehicle Sensor Data and IoT for Injury Prevention
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-298
by
Christopher Yang
,
Ou Liang
,
Santiago Ontanon
,
Weimao Ke
,
Helen Loeb
,
Charlie Klauer
Hybrid Machine-Crowd Approach for Fake News Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-306
by
Shaban Shabani
,
Maria Sokhn
Understanding the Determinants of Enterprise Social Network Use
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-316
by
Gerald Stei
,
Alexander Rossmann
ysla: Reusable and Configurable SLAs for Large-Scale SLA Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-325
by
Robert Engel
,
Shashank Rajamoni
,
Bryant Chen
,
Heiko Ludwig
,
Alexander Keller
Osmotic Collaborative Computing for Machine Learning and Cybersecurity Applications in Industrial IoT Networks and Cyber Physical Systems with Gaussian Mixture Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-335
by
Emmanuel Oyekanlu
Fault-Tolerant Real-Time Collaborative Network Edge Analytics for Industrial IoT and Cyber Physical Systems with Communication Network Diversity
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-345
by
Emmanuel Oyekanlu
Open Educational Resources Platform Based on Collective Intelligence
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-353
by
Marcela Ribeiro de Oliveira
,
Israel Barreto Sant’Anna
,
Guilherme Scariot Ramos
,
Luis Carlos Erpen de Bona
,
Marcos Alexandre Castilho
,
Marcos Didonet Del Fabro
,
Eduardo Todt
Early Detection of Cybersecurity Threats Using Collaborative Cognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 354-363
by
Sandeep Nair Narayanan
,
Ashwinkumar Ganesan
,
Karuna Joshi
,
Tim Oates
,
Anupam Joshi
,
Tim Finin
Knowledge Modeling and Management for Mobility and Transport Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-371
by
Pierfrancesco Bellini
,
Stefano Bilotta
,
Daniele Cenni
,
Paolo Nesi
,
Michela Paolucci
,
Mirco Soderi
Joint Cost Estimation Approach for Service Provider Legacy Network Migration to Unified Software Defined IPv6 Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-379
by
Babu R. Dawadi
,
Danda B. Rawat
,
Shashidhar R. Joshi
,
Martina M. Keitsch
Urban Pollution Monitoring Based on Mobile Crowd Sensing: An Osmotic Computing Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-387
by
Antonella Longo
,
Andrea De Matteis
,
Marco Zappatore
Auditing and Assessment of Data Traffic Flows in an IoT Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-391
by
Paolo Nesi
,
Gianni Pantaleo
,
Michela Paolucci
,
Imad Zaza
Designing a FIWARE Cloud Solution for Making Your Travel Smoother: The FLIWARE Experience
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-398
by
Lorenzo Carnevale
,
Antonino Galletta
,
Maria Fazio
,
Antonio Celesti
,
Massimo Villari
Intelligent Crime Anomaly Detection in Smart Cities Using Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 399-404
by
Sharmila Chackravarthy
,
Steven Schmitt
,
Li Yang
Assessment of an IoT Platform for Data Collection and Analysis for Medical Sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-411
by
João Rei
,
Cláudia Brito
,
António Sousa
A Method for Large-Scale Resource Allocation in Smart Cities
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-415
by
Hadi Hajari
,
Hassan A. Karimi
Tapping Into the Use of Social Media Applications for Harnessing the Citizens' Collective Intelligence in the Strategic Digital City
Full-text access may be available. Sign in or learn about subscription options.
pp. 416-423
by
Carla Cavichiolo Flores
,
Denis Alcides Rezende
,
Luisa Aguilar Lopes
Visual Analytics Ontology-Guided I-DE System: A Case Study of Head and Neck Cancer in Australia
Full-text access may be available. Sign in or learn about subscription options.
pp. 424-429
by
Ahsan Morshed
,
Abdur Rahim Mohammad Forkan
,
Tejal Shah
,
Prem Prakash Jayaraman
,
Rajiv Ranjan
,
Dimitrios Georgakopoulos
Using Fuzzy Geoparticipation Methods to Optimize the Spatial Development Process in a Smart City
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-437
by
Robert Olszewski
,
Agnieszka Turek
A Multilayer Perceptron-Based Distributed Intrusion Detection System for Internet of Vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-445
by
Ayesha Anzer
,
Mourad Elhadef
Towards the Basic Principles of Osmotic Computing: A Closed-Loop Gamified Cognitive Rehabilitation Flow Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 446-452
by
Alina Buzachis
,
Giuseppe Massimo Bernava
,
Mario Busa
,
Giovanni Pioggia
,
Massimo Villari
Train and Equip Firefighters with Cognitive Virtual and Augmented Reality
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-459
by
Li Yang
,
Yu Liang
,
Dalei Wu
,
Jim Gault
Semantically Rich, Context Aware Access Control for Openstack
Full-text access may be available. Sign in or learn about subscription options.
pp. 460-465
by
Vishal Rathod
,
Sandeep Narayanan
,
Sudip Mittal
,
Anupam Joshi
Cold-Start User-Based Weighted Collaborative Filtering for an Implicit Recommender System for Research Facilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 466-471
by
Yogesh Kale
,
Samantha E. Petrie
,
Marwan Bikdash
,
Michael D. Topal
Multi-Stakeholder Consensus Decision-Making Framework Based on Trust: A Generic Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 472-479
by
Lina Alfantoukh
,
Yefeng Ruan
,
Arjan Durresi
Analyzing CDR/IPDR Data to Find People Network from Encrypted Messaging Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-486
by
Adya Joshi
,
Madan Oberoi
,
Ranjan Bose
Author Index
Freely available from IEEE.
pp. 487-489
[Publisher's information]
Freely available from IEEE.
pp. 490-490
Showing 74 out of 74