default search action
2nd BigDataSecurity/HPSC/IDS 2016: New York, NY, USA
- 2nd IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2016, IEEE International Conference on High Performance and Smart Computing, HPSC 2016, and IEEE International Conference on Intelligent Data and Security, IDS 2016, New York, NY, USA, April 9-10, 2016. IEEE 2016, ISBN 978-1-5090-2403-2
- Amar Sharma, Rajiv Misra:
Computing Large Connected Components Using Map Reduce in Logarithmic Rounds. 1-6 - Xiaoming Yao, Xiaoyi Zhou, Jixin Ma:
Differential Privacy of Big Data: An Overview. 7-12 - Nafiseh Kahani, Khalid Elgazzar, James R. Cordy:
Authentication and Access Control in e-Health Systems in the Cloud. 13-23 - Anku Adhikari, Avesta Hojjati, Juanli Shen, Jui-Ting Hsu, William P. King, Marianne Winslett:
Trust Issues for Big Data about High-Value Manufactured Parts. 24-29 - Xiaofei Hou, Doyel Pal, Ashwin Kumar T. K, Johnson P. Thomas, Hong Liu:
Privacy Preserving Rack-Based Dynamic Workload Balancing for Hadoop MapReduce. 30-35 - Pedro Henrique B. Las-Casas, Vinícius Vitor dos Santos Dias, Wagner Meira Jr., Dorgival O. Guedes:
A Big Data Architecture for Security Data and Its Application to Phishing Characterization. 36-41 - Yanzhen Qu, Philip Chan:
Assessing Vulnerabilities in Bluetooth Low Energy (BLE) Wireless Network Based IoT Systems. 42-48 - Kalyan Veeramachaneni, Ignacio Arnaldo, Vamsi Korrapati, Constantinos Bassias, Ke Li:
AI^2: Training a Big Data Machine to Defend. 49-54 - Baijian Yang, Tonglin Zhang:
A Scalable Meta-Model for Big Data Security Analyses. 55-60 - Vasco Samuel Carvalho, Maria João Polidoro, João Paulo Magalhães:
OwlSight: Platform for Real-Time Detection and Visualization of Cyber Threats. 61-66 - J. Jenny Li, Fenando Neto, Jingchio Liou:
Clouds for Hit-and-Run Wireless Attacks. 67-72 - Boxiang Dong, Wendy Hui Wang, Jie Yang:
Secure Data Outsourcing with Adversarial Data Dependency Constraints. 73-78 - Gaurav Bansod, Abhijit Patil, Swapnil Sutar, Narayan Pisharoty:
An Ultra Lightweight Encryption Design for Security in Pervasive Computing. 79-84 - B. Eswara Reedy, Gandikota Ramu:
A Secure Framework for Ensuring EHR's Integrity Using Fine-Grained Auditing and CP-ABE. 85-89 - Christine Atwell, Thomas Blasi, Thaier Hayajneh:
Reverse TCP and Social Engineering Attacks in the Era of Big Data. 90-95 - Cherif A. A. Bissiriou, Mostapha Zbakh:
Towards Secure Tag-MapReduce Framework in Cloud. 96-104 - Huijuan Wang, Yong Jiang, Gao-Feng Zhan, Rui-Sheng Shi:
Arithmetic Correlation Used in Mobile Cloud ID-Based Multiple Authentication. 105-108 - Udaya Kiran Tupakula, Vijay Varadharajan:
Securing Big Data Environments from Attacks. 109-112 - Vasily Sidorov, Wee Keong Ng:
Towards Performance Evaluation of Oblivious Data Processing Emulated with Partially Homomorphic Encryption Schemes. 113-115 - Srinivasan Shanmugam, Harish Ragavan:
A Novel Approach to Predictive Graphs Using Big Data. 123-128 - Tianda Yang, Kai Qian, Dan Chia-Tien Lo, Ying Xie, Yong Shi, Lixin Tao:
Improve the Prediction Accuracy of Naïve Bayes Classifier with Association Rule Mining. 129-133 - Srinivasan Shanmugam, Gokul Seshadri:
Aspects of Data Cataloguing for Enterprise Data Platforms. 134-139 - Keke Gai, Meikang Qiu, Hui Zhao:
Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big Data. 140-145 - Zaid Ameen Abduljabbar, Hai Jin, Zaid Alaa Hussien, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment. 146-151 - Ming-Quan Hong, Peng-Yu Wang, Wen-Bo Zhao:
Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing. 152-157 - Peng-Yu Wang, Ming-Quan Hong:
A Secure Management Scheme Designed in Cloud. 158-162 - Guan Yang, Xiaolong Xu:
Cooperative Monitoring Mechanism for Cluster Based on Message Routing Queue. 163-170 - Keke Gai, Meikang Qiu, Sam Adam Elnagdy:
A Novel Secure Big Data Cyber Incident Analytics Framework for Cloud-Based Cybersecurity Insurance. 171-176 - Emmanuel S. Peters, Nicholas F. Maxemchuk:
Privacy in the Cloud: Anonymous Tax Preparation. 177-182 - Kutub Thakur, Md Liakat Ali, Ning Jiang, Meikang Qiu:
Impact of Cyber-Attacks on Critical Infrastructure. 183-186 - Kutub Thakur, Md Liakat Ali, Keke Gai, Meikang Qiu:
Information Security Policy for E-Commerce in Saudi Arabia. 187-190 - Xu Wang, Yongxin Zhu, Yufeng Chen:
Quantitative Analysis of Graph Algorithms: Models and Optimization Methods. 191-196 - Keke Gai, Meikang Qiu, Sam Adam Elnagdy:
Security-Aware Information Classifications Using Supervised Learning for Cloud-Based Cyber Risk Management in Financial Big Data. 197-202 - Siddharth Bhatia, Mohan Pavan Kumar Badarla:
Parallelization of Error Weighted Hashing for Approximate k-Nearest Neighbour Search on GPU-CPU Hybrid. 203-207 - David M. Tagatac, Michalis Polychronakis, Salvatore J. Stolfo:
Using Diversity to Harden Multithreaded Programs Against Exploitation. 208-213 - Camille Coti:
Exploiting Redundant Computation in Communication-Avoiding Algorithms for Algorithm-Based Fault Tolerance. 214-219 - Kun Wang, Hui Liu, Jia Luo, Song Yu, Zhangxin Chen, Peng Zhang:
Parallel Simulation of Full-Field Polymer Flooding. 220-225 - Usamah Algemili:
Investigation of Reconfigurable FPGA Design for Processing Big Data Streams. 226-233 - Jun Wu, Chen-Yuan Wang, Jian-Fu Li:
LA-Credit: A Load-Awareness Scheduling Algorithm for Xen Virtualized Platforms. 234-239 - Iksen Caglar, Deniz Turgay Altilar:
An Energy Efficient VM Allocation Approach for Data Centers. 240-244 - Hua Yin, Keke Gai, Zhijian Wang:
A Classification Algorithm Based on Ensemble Feature Selections for Imbalanced-Class Dataset. 245-249 - Andrew Burke:
Performance of Partitioned Homogeneous Multiprocessor Real-Time Scheduling Algorithms in Heterogeneous Environments. 250-255 - Jun Liu, Jinhua Guo, Di Ma:
Traffic Aware Virtual Machine Packing in Cloud Data Centers. 256-261 - Wei Dai, Ibrahim Adel Ibrahim, Mostafa A. Bassiouni:
A New Replica Placement Policy for Hadoop Distributed File System. 262-267 - Veena Reddy Reguri, Swetha Kogatam, Melody Moh:
Energy Efficient Traffic-Aware Virtual Machine Migration in Green Cloud Data Centers. 268-273 - Chao Gao, Peng Zhang, Danny Bluestein:
Multiscale Modeling of Mechanotransduction Processes in Flow-Induced Platelet Activation. 274-279 - Bo Yang, Hui Liu, Zhangxin Chen, Xuhong Tian:
GPU-Accelerated Preconditioned GMRES Solver. 280-285 - Jia Luo, Kun Wang, Hui Liu, Zhangxin Chen:
Coupled Geomechanics and Reservoir Flow Modeling on Distributed Memory Parallel Computers. 286-291 - Yan Chen, Hui Liu, Kun Wang, Zhangxin Chen, Yanfeng He, Bo Yang, Peng Zhang:
Large-Scale Reservoir Simulations on Parallel Computers. 292-297 - Li Liao, Zeyao Mo, Aiqing Zhang:
A Component Based Graphical Parallel Programming Approach for Numerical Simulation Development. 298-303 - Tao Cui, Junqing Chen, Hengliang Zhu, Xuan Zeng:
Algorithms in ParAFEMImp: A Parallel and Wideband Impedance Extraction Program for Complicated 3-D Geometries. 304-309 - Qingkai Liu, Weibo Zhao, Jie Cheng, Zeyao Mo, Aiqing Zhang, Jianjun Liu:
A Programming Framework for Large Scale Numerical Simulations on Unstructured Mesh. 310-315 - Hong Guo, Aiqing Zhang, Zeyao Mo, Ye Pu:
A Scalable, Parallel Module for Overlapping Grids and Its Applications. 316-321 - Jian Yao, Zhang Kaifeng:
Evaluation Model of the Artist Based on Fuzzy Membership to Improve the Principal Component Analysis of Robust Kernel. 322-326 - Seungmin Kang, Bharadwaj Veeravalli, Khin Mi Mi Aung:
A Security-Aware Data Placement Mechanism for Big Data Cloud Storage Systems. 327-332 - Pascal Urien, Xavier Aghina:
Secure Mobile Payments Based on Cloud Services: Concepts and Experiments. 333-338 - Fan Yu, Melody Moh, Teng-Sheng Moh:
Towards Extracting Drug-Effect Relation from Twitter: A Supervised Learning Approach. 339-344 - Yekta Said Can, Fatih Alagöz:
A Secure Biometric Identification Technique Using Spread Spectrum Audio Watermarking. 345-350 - Viktoriya Degeler, Richard French, Kevin Jones:
Self-Healing Intrusion Detection System Concept. 351-356 - Chen Zhong, John Yen, Peng Liu, Robert F. Erbacher:
Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process. 357-363 - Remon Cornelisse, Mortaza S. Bargh, Sunil Choenni, Debora E. G. Moolenaar, Luc V. de Zeeuw:
Compressing Large Amounts of NetFlow Data Using a Pattern Classification Scheme. 364-370 - Wael Hosny Fouad Aly:
Adaptive Combinatorial Key Scheme for Mobile Heterogeneous Wireless Sensor Networks. 371-376 - Masaya Yoshikawa, Yusuke Nozaki, Kensaku Asahi:
Vulnerability Evaluation Accelerator for Lightweight Ciphers. 377-381 - Imad Jawhar, Farhan Mohammed, Jameela Al-Jaroodi, Nader Mohamed:
TRAS: A Trust-Based Routing Protocol for Ad Hoc and Sensor Networks. 382-387 - Farhan Mohammed, Imad Jawhar, Nader Mohamed, Ahmed Idries:
Towards Trusted and Efficient UAV-Based Communication. 388-393 - Yulia Rossikova, J. Jenny Li, Patricia Morreale:
Intelligent Data Mining for Translator Correctness Prediction. 394-399 - Vicky Na Zhao, Melody Moh, Teng-Sheng Moh:
Contextual-Aware Hybrid Recommender System for Mixed Cold-Start Problems in Privacy Protection. 400-405 - Anna Little, Xenia Mountrouidou, Daniel Moseley:
Spectral Clustering Technique for Classifying Network Attacks. 406-411 - Salah H. Abbdal, Hai Jin, Ali A. Yassin, Zaid Ameen Abduljabbar, Mohammed Abdulridha Hussain, Zaid Alaa Hussien, Deqing Zou:
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage. 412-417 - Li Ma, Lixin Tao, Yong Zhong, Keke Gai:
RuleSN: Research and Application of Social Network Access Control Model. 418-423 - Nader Mohamed, Haya AlDhaheri, Khadeijah Almurshidi, Mahra Al-Hammoudi, Salama Al-Yalyali, Imad Jawhar, Jameela Al-Jaroodi:
Using UAVs to Secure Linear Wireless Sensor Networks. 424-429
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.