Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CSCLOUD
CSCLOUD 2016
Generate Citations
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)
June 25 2016 to June 27 2016
Beijing, China
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-ix
Message from the General Chairs of CSCloud/SSC 2016
Freely available from IEEE.
pp. x-x
Message from the Program Chairs of CSCloud 2016
Freely available from IEEE.
pp. xi-xi
Committee Members of CSCloud 2016
Freely available from IEEE.
pp. xii-xiv
Message from the Program Chairs of SSC 2016
Freely available from IEEE.
pp. xv-xv
Committee Members of SSC 2016
Freely available from IEEE.
pp. xvi-xvii
Cyber Security, a Threat to Cyber Banking in South Africa: An Approach to Network and Application Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Thierry Mbah Mbelli
,
Barry Dwolatzky
Wormhole Detection in Secured BGP Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-11
by
Youssef Gahi
,
Junaid Israr
,
Mouhcine Guennoun
Electricity Cost Management for Cloud Data Centers under Diverse Delay Constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-19
by
Yuqi Fan
,
Yongfeng Xia
,
Yuheng Liu
,
Xiaohui Yuan
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-25
by
Qiumao Ma
,
Jinsheng Zhang
,
Yang Peng
,
Wensheng Zhang
,
Daji Qiao
Controlling a Car Through OBD Injection
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-29
by
Yu Zhang
,
Binbin Ge
,
Xiang Li
,
Bin Shi
,
Bo Li
A Novel Software Defined Networking Framework for Cloud Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-35
by
Yukun Zhang
,
Bo Li
Saphena: An Approach for Analyzing Similarity of Heterogeneous Policies in Cloud Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-41
by
Li Lin
,
Jian Hu
,
Xinya Mao
,
Jianbiao Zhang
A Cluster-Based Intrusion Detection Framework for Monitoring the Traffic of Cloud Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-45
by
Bo Li
,
Peng Liu
,
Li Lin
Towards an Out-of-the-Box Cloud Application Monitoring Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-49
by
Jianjun Li
,
Wei Li
,
Ming Li
CloudAuditor: A Cloud Auditing Framework Based on Nested Virtualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-53
by
Zhe Wang
,
Jin Zeng
,
Tao Lv
,
Bin Shi
,
Bo Li
A New Block-Based Data Distribution Mechanism in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-59
by
Chandrima Dadi
,
Ping Yi
,
Zongming Fei
,
Hui Lu
An Analysis of Server-Side Design for Seed-Based Mobile Authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-65
by
Longbin Chen
,
Li-Chiou Chen
,
Nader Nassar
,
Meikang Qiu
Efran (O): "Efficient Scalar Homomorphic Scheme on MapReduce for Data Privacy Preserving"
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-74
by
Konan Martin
,
Wenyong Wang
,
Brighter Agyemang
MongoDB NoSQL Injection Analysis and Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-78
by
Boyu Hou
,
Kai Qian
,
Lei Li
,
Yong Shi
,
Lixin Tao
,
Jigang Liu
A Framework Research of Power Grid Knowledge Recommendation and Situation Reasoning Based on Cloud Computing and CEP
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-83
by
Jian Su
,
Yu Huang
,
Guangxian Lv
,
Haitao Liu
,
Peng Jin
Sequence-Based Analysis of Static Probe Instrumentation Data for a VMM-Based Anomaly Detection System
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-94
by
Ady Wahyudi Paundu
,
Takeshi Okuda
,
Youki Kadobayashi
,
Suguru Yamaguchi
A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-101
by
Mounib Khanafer
,
Youssef Gahi
,
Mouhcine Guennoun
,
Hussein T. Mouftah
Security Vulnerabilities and Countermeasures for Time Synchronization in IEEE802.15.4e Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-107
by
Wei Yang
,
Qin Wang
,
Yadong Wan
,
Jie He
A Threshold Multi-server Protocol for Password-Based Authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-118
by
Mengxiang Guan
,
Jiaxing Song
,
Weidong Liu
Shortest Processing Time First Algorithm for Hadoop
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-123
by
Laurent Bobelin
,
Patrick Martineau
,
Di Zhao
,
Haiwu He
Resource Optimization Strategy for CPU Intensive Applications in Cloud Computing Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-128
by
Junjie Peng
,
Jinbao Chen
,
Shuai Kong
,
Danxu Liu
,
Meikang Qiu
Empirical Study of Using Big Data for Business Process Improvement at Private Manufacturing Firm in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-135
by
Ziqi Wang
,
Haihui Zhao
On-demand Pseudonym Systems in Geo-Distributed Mobile Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-141
by
Jiawen Kang
,
Rong Yu
,
Xumin Huang
,
Sabita Maharjan
,
Yan Zhang
A Reinforcement Learning-Based Mixed Job Scheduler Scheme for Cloud Computing under SLA Constraint
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-147
by
Zhiping Peng
,
Delong Cui
,
Yuanjia Ma
,
Jianbin Xiong
,
Bo Xu
,
Weiwei Lin
A Multi-level Intelligent Selective Encryption Control Model for Multimedia Big Data Security in Sensing System with Resource Constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-153
by
Chen Xiao
,
Lifeng Wang
,
Zhu Jie
,
Tiemeng Chen
A Consolidation Strategy Supporting Resources Oversubscription in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-162
by
Ying Liu
R-Learning and Gaussian Process Regression Algorithm for Cloud Job Access Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-166
by
Zhiping Peng
,
Delong Cui
,
Yuanjia Ma
,
Jianbin Xiong
,
Bo Xu
,
Weiwei Lin
Survey on Data Integrity in Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-171
by
Kamile Nur Sevis
,
Ensar Seker
A Correctness Verification Method for C Programs Based on VCC
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-177
by
Hongliang Liang
,
Daijie Zhang
,
Xiaoxiao Pei
,
Xiaodong Jia
,
Guangyuan Li
,
Jiuyun Xu
Mobile App Collusions and Its Cyber Security Implications
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-183
by
Abdullahi Arabo
A Universal Algorithm to Secure Stolen Mobile Devices Using Wi-Fi in Indoors Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-189
by
Wei Ding
,
José Arriaga
Toward a Big Data Architecture for Security Events Analytic
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-197
by
Laila Fetjah
,
Karim Benzidane
,
Hassan El Alloussi
,
Othman El Warrak
,
Said Jai-Andaloussi
,
Abderrahim Sekkaki
Energy-Aware Optimal Task Assignment for Mobile Heterogeneous Embedded Systems in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-203
by
Keke Gai
,
Meikang Qiu
,
Hui Zhao
,
Meiqin Liu
Keystroke Biometric User Verification Using Hidden Markov Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-209
by
Md Liakat Ali
,
Kutub Thakur
,
Charles C. Tappert
,
Meikang Qiu
An Analysis of Information Security Event Managers
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-215
by
Kutub Thakur
,
Sandra Kopecky
,
Moath Nuseir
,
Md Liakat Ali
,
Meikang Qiu
Preparation of Graphene and Its Performance Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-219
by
Wan Sheng
Dynamic Android Malware Classification Using Graph-Based Representations
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-231
by
Lifan Xu
,
Dongping Zhang
,
Marco A. Alvarez
,
Jose Andre Morales
,
Xudong Ma
,
John Cavazos
SensIaas: A Sensor-Cloud Infrastructure with Sensor Virtualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-239
by
Sunanda Bose
,
Nandini Mukherjee
Powering Filtration Process of Cyber Security Ecosystem Using Knowledge Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-246
by
Claude Asamoah
,
Lixin Tao
,
Keke Gai
,
Ning Jiang
Scalable Fog Computing with Service Offloading in Bus Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-251
by
Dongdong Ye
,
Maoqiang Wu
,
Shensheng Tang
,
Rong Yu
A Remote Backup Approach for Virtual Machine Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-255
by
Zhe Wang
,
Jin Zeng
,
Tao Lv
,
Bin Shi
,
Bo Li
An Improved Matrix Encoding Steganography Algorithm Based on H.264 Video
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-260
by
Liyun Qian
,
Zhitang Li
,
Pei Zhou
,
Jian Chen
A Semantic Approach to Intelligent and Personal Tutoring System
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-266
by
Maria Sette
,
Lixin Tao
,
Keke Gai
,
Ning Jiang
Reducing Complexity of Diagnostic Message Pattern Specification and Recognition on In-Bound Data Using Semantic Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-272
by
Gilbert Alipui
,
Lixin Tao
,
Keke Gai
,
Ning Jiang
Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-278
by
Keke Gai
,
Meikang Qiu
,
Hui Zhao
,
Jian Xiong
Improving Data Governance in Large Organizations through Ontology and Linked Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-284
by
R. J. DeStefano
,
Lixin Tao
,
Keke Gai
Drug Side Effects Data Representation and Full Spectrum Inferencing Using Knowledge Graphs in Intelligent Telehealth
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-294
by
Saravanan Jayaraman
,
Lixin Tao
,
Keke Gai
,
Ning Jiang
Understanding Taxonomy of Cyber Risks for Cybersecurity Insurance of Financial Industry in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-300
by
Sam Adam Elnagdy
,
Meikang Qiu
,
Keke Gai
Cyber Incident Classifications Using Ontology-Based Knowledge Representation for Cybersecurity Insurance in Financial Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-306
by
Sam Adam Elnagdy
,
Meikang Qiu
,
Keke Gai
Author index
Freely available from IEEE.
pp. 307-308
Publisher's Information
Freely available from IEEE.
pp. 310-310
Showing 60 out of 60