Default Cover Image

2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)

June 25 2016 to June 27 2016

Beijing, China

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-ix
Message from the General Chairs of CSCloud/SSC 2016Freely available from IEEE.pp. x-x
Message from the Program Chairs of CSCloud 2016Freely available from IEEE.pp. xi-xi
Committee Members of CSCloud 2016Freely available from IEEE.pp. xii-xiv
Message from the Program Chairs of SSC 2016Freely available from IEEE.pp. xv-xv
Committee Members of SSC 2016Freely available from IEEE.pp. xvi-xvii
Wormhole Detection in Secured BGP NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 7-11
Electricity Cost Management for Cloud Data Centers under Diverse Delay ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 12-19
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 20-25
Controlling a Car Through OBD InjectionFull-text access may be available. Sign in or learn about subscription options.pp. 26-29
A Novel Software Defined Networking Framework for Cloud EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 30-35
Saphena: An Approach for Analyzing Similarity of Heterogeneous Policies in Cloud EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 36-41
A Cluster-Based Intrusion Detection Framework for Monitoring the Traffic of Cloud EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 42-45
Towards an Out-of-the-Box Cloud Application Monitoring FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 46-49
CloudAuditor: A Cloud Auditing Framework Based on Nested VirtualizationFull-text access may be available. Sign in or learn about subscription options.pp. 50-53
A New Block-Based Data Distribution Mechanism in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 54-59
An Analysis of Server-Side Design for Seed-Based Mobile AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 60-65
Efran (O): "Efficient Scalar Homomorphic Scheme on MapReduce for Data Privacy Preserving"Full-text access may be available. Sign in or learn about subscription options.pp. 66-74
MongoDB NoSQL Injection Analysis and DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 75-78
A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 95-101
Security Vulnerabilities and Countermeasures for Time Synchronization in IEEE802.15.4e NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 102-107
A Threshold Multi-server Protocol for Password-Based AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 108-118
Shortest Processing Time First Algorithm for HadoopFull-text access may be available. Sign in or learn about subscription options.pp. 119-123
Resource Optimization Strategy for CPU Intensive Applications in Cloud Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 124-128
Empirical Study of Using Big Data for Business Process Improvement at Private Manufacturing Firm in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 129-135
On-demand Pseudonym Systems in Geo-Distributed Mobile Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 136-141
A Consolidation Strategy Supporting Resources Oversubscription in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 154-162
R-Learning and Gaussian Process Regression Algorithm for Cloud Job Access ControlFull-text access may be available. Sign in or learn about subscription options.pp. 163-166
Survey on Data Integrity in CloudFull-text access may be available. Sign in or learn about subscription options.pp. 167-171
A Correctness Verification Method for C Programs Based on VCCFull-text access may be available. Sign in or learn about subscription options.pp. 172-177
Mobile App Collusions and Its Cyber Security ImplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 178-183
A Universal Algorithm to Secure Stolen Mobile Devices Using Wi-Fi in Indoors EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 184-189
Energy-Aware Optimal Task Assignment for Mobile Heterogeneous Embedded Systems in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 198-203
Keystroke Biometric User Verification Using Hidden Markov ModelFull-text access may be available. Sign in or learn about subscription options.pp. 204-209
An Analysis of Information Security Event ManagersFull-text access may be available. Sign in or learn about subscription options.pp. 210-215
Preparation of Graphene and Its Performance AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 216-219
Dynamic Android Malware Classification Using Graph-Based RepresentationsFull-text access may be available. Sign in or learn about subscription options.pp. 220-231
SensIaas: A Sensor-Cloud Infrastructure with Sensor VirtualizationFull-text access may be available. Sign in or learn about subscription options.pp. 232-239
Powering Filtration Process of Cyber Security Ecosystem Using Knowledge GraphFull-text access may be available. Sign in or learn about subscription options.pp. 240-246
Scalable Fog Computing with Service Offloading in Bus NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 247-251
A Remote Backup Approach for Virtual Machine ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 252-255
An Improved Matrix Encoding Steganography Algorithm Based on H.264 VideoFull-text access may be available. Sign in or learn about subscription options.pp. 256-260
A Semantic Approach to Intelligent and Personal Tutoring SystemFull-text access may be available. Sign in or learn about subscription options.pp. 261-266
Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 273-278
Improving Data Governance in Large Organizations through Ontology and Linked DataFull-text access may be available. Sign in or learn about subscription options.pp. 279-284
Understanding Taxonomy of Cyber Risks for Cybersecurity Insurance of Financial Industry in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 295-300
Author indexFreely available from IEEE.pp. 307-308
Publisher's InformationFreely available from IEEE.pp. 310-310
Showing 60 out of 60