Default Cover Image

2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC)

Oct. 18 2018 to Oct. 20 2018

Philadelphia, PA, USA

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 3-3
[Copyright notice]Freely available from IEEE.pp. 4-4
Table of contentsFreely available from IEEE.pp. 5-11
Message from the CIC 2018 General Co-ChairsFreely available from IEEE.pp. 12-13
Message from the CIC 2018 Program Co-ChairsFreely available from IEEE.pp. 14-15
CIC 2018 Organizing CommitteeFreely available from IEEE.pp. 16-16
CIC 2018 Steering CommitteeFreely available from IEEE.pp. 17-17
CIC 2018 Technical CommitteeFreely available from IEEE.pp. 18-18
CIC 2018 External Reviewers and SubreviewersFreely available from IEEE.pp. 19-19
CIC 2018 KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. 20-24
CIC 2018 TutorialsFull-text access may be available. Sign in or learn about subscription options.pp. 25-33
AutoBotCatcher: Blockchain-Based P2P Botnet Detection for the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Blockchain-Based PKI Solutions for IoTFull-text access may be available. Sign in or learn about subscription options.pp. 9-15
Monitor: An Abnormality Detection Approach in Buildings Energy ConsumptionFull-text access may be available. Sign in or learn about subscription options.pp. 16-25
Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data RepositoriesFull-text access may be available. Sign in or learn about subscription options.pp. 26-35
Link-Sign Prediction in Dynamic Signed Directed NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 36-45
Investigating Aspects of Platform Growth on Crowdsource Driven Recommendation ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 56-63
Parallel Schedule of Live Migrations for Virtual Machine PlacementsFull-text access may be available. Sign in or learn about subscription options.pp. 64-70
Link-Quality and Traffic-Load Aware Routing for UAV Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 71-79
Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face of an AttackFull-text access may be available. Sign in or learn about subscription options.pp. 80-89
A Decentralized Marketplace Application on the Ethereum BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 90-97
A QoS Framework for SDN-Based NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 98-105
Lightweight Web Services Migration Framework in Hybrid CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 106-113
Collaborative and Accountable Hardware Governance Using BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 114-121
Blockchain as a Platform for Secure Inter-Organizational Business ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 122-129
Towards Modernizing the Future of American VotingFull-text access may be available. Sign in or learn about subscription options.pp. 130-135
RIPA: Real-Time Image Privacy Alert SystemFull-text access may be available. Sign in or learn about subscription options.pp. 136-145
Detection of Temporal Data Ex-Filtration Threats to Relational DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 146-155
Prunable Authenticated Log and Authenticable Snapshot in Distributed Collaborative SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 156-165
Context-Aware Deep Learning-Driven Framework for Mitigation of Security Risks in BYOD-Enabled EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 166-175
Alcatraz: Data Exfiltration-Resilient Corporate Network ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 176-187
Supporting Virtual Organizations Using Attribute-Based Encryption in Named Data NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 188-196
The Impact of Malicious Accounts on Political Tweet SentimentFull-text access may be available. Sign in or learn about subscription options.pp. 197-202
Policy and Resource Orchestration in Software-Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 203-206
New Algorithms and Methods for Collaborative Co-Editing Using HTML DOM SynchronizationFull-text access may be available. Sign in or learn about subscription options.pp. 217-226
A Teacher Dashboard for Real-Time InterventionFull-text access may be available. Sign in or learn about subscription options.pp. 227-235
Automated Threat Report Classification over Multi-Source DataFull-text access may be available. Sign in or learn about subscription options.pp. 236-245
Envisioning an Information Assurance and Performance Infrastructure for the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 266-271
MEDUSA: Malware Detection Using Statistical Analysis of System's BehaviorFull-text access may be available. Sign in or learn about subscription options.pp. 272-278
Next Generation Trustworthy Fraud DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 279-282
Storage Service Orchestration with Container ElasticityFull-text access may be available. Sign in or learn about subscription options.pp. 283-292
Predictive Modeling with Vehicle Sensor Data and IoT for Injury PreventionFull-text access may be available. Sign in or learn about subscription options.pp. 293-298
Hybrid Machine-Crowd Approach for Fake News DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 299-306
Understanding the Determinants of Enterprise Social Network UseFull-text access may be available. Sign in or learn about subscription options.pp. 307-316
ysla: Reusable and Configurable SLAs for Large-Scale SLA ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 317-325
Early Detection of Cybersecurity Threats Using Collaborative CognitionFull-text access may be available. Sign in or learn about subscription options.pp. 354-363
Urban Pollution Monitoring Based on Mobile Crowd Sensing: An Osmotic Computing ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 380-387
Auditing and Assessment of Data Traffic Flows in an IoT ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 388-391
Intelligent Crime Anomaly Detection in Smart Cities Using Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 399-404
Assessment of an IoT Platform for Data Collection and Analysis for Medical SensorsFull-text access may be available. Sign in or learn about subscription options.pp. 405-411
A Method for Large-Scale Resource Allocation in Smart CitiesFull-text access may be available. Sign in or learn about subscription options.pp. 412-415
Using Fuzzy Geoparticipation Methods to Optimize the Spatial Development Process in a Smart CityFull-text access may be available. Sign in or learn about subscription options.pp. 430-437
A Multilayer Perceptron-Based Distributed Intrusion Detection System for Internet of VehiclesFull-text access may be available. Sign in or learn about subscription options.pp. 438-445
Train and Equip Firefighters with Cognitive Virtual and Augmented RealityFull-text access may be available. Sign in or learn about subscription options.pp. 453-459
Semantically Rich, Context Aware Access Control for OpenstackFull-text access may be available. Sign in or learn about subscription options.pp. 460-465
Multi-Stakeholder Consensus Decision-Making Framework Based on Trust: A Generic FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 472-479
Analyzing CDR/IPDR Data to Find People Network from Encrypted Messaging ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 480-486
Author IndexFreely available from IEEE.pp. 487-489
[Publisher's information]Freely available from IEEE.pp. 490-490
Showing 74 out of 74