


default search action
MONAMI 2017: Melbourne, Australia
- Jiankun Hu, Ibrahim Khalil
, Zahir Tari
, Sheng Wen:
Mobile Networks and Management - 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 235, Springer 2018, ISBN 978-3-319-90774-1 - Ben Quinton, Neda Aboutorab
:
Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications. 1-13 - Efthimios Alepis, Constantinos Patsakis:
Persistent vs Service IDs in Android: Session Fingerprinting from Apps. 14-29 - Nickolaos Koroniotis, Nour Moustafa
, Elena Sitnikova
, Jill Slay
:
Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques. 30-44 - C. P. Sona
, Jaison Paul Mulerikkal
:
Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework. 45-55 - Yanming Zhu
, Xuefei Yin
, Jiankun Hu
:
Robust Fingerprint Matching Based on Convolutional Neural Networks. 56-65 - Xue Tian, Peisong Shen
, Tengfei Yang, Chi Chen, Jiankun Hu
:
A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data. 66-78 - Zhaohua Zhou, Shi Shi, Shunan Ma, Jing Fu:
Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling. 79-86 - Rizza T. Loquias
, Nestor Michael C. Tiglao
, Jhoanna Rhodette I. Pedrasa, Joel Joseph S. Marciano:
Factor Effects for Routing in a Delay-Tolerant Wireless Sensor Network for Lake Environment Monitoring. 87-100 - Yen Hong Tran, Quang Nhat Tran:
Estimating Public Opinion in Social Media Content Using Aspect-Based Opinion Mining. 101-115 - Nam Nhat Tran, Ruhul A. Sarker
, Jiankun Hu
:
An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural Network. 116-126 - Xuefei Yin
, Yanming Zhu
, Jiankun Hu
:
A Robust Contactless Fingerprint Enhancement Algorithm. 127-136 - Waqas Haider, Jiankun Hu
, Nour Moustafa
:
Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning. 137-149 - Tiong-Sik Ng
, Syh-Yuan Tan
, Ji-Jian Chin
:
A Variant of BLS Signature Scheme with Tight Security Reduction. 150-163 - Fei Li, Ying Guo, Jiankun Hu
:
Quantum Authentication Scheme Based on Fingerprint-Encoded Graph States. 164-177 - Abdelaziz Bouras, Houssem Gasmi, Fadi Ghemri:
Cooperative Information Security/Cybersecurity Curriculum Development. 178-187 - Emna Baccour, Ala Gouissem, Sebti Foufou, Ridha Hamila, Zahir Tari, Albert Y. Zomaya
:
An Energy Saving Mechanism Based on Vacation Queuing Theory in Data Center Networks. 188-202 - Hamid Usefi, Sudharaka Palamakumbura:
Homomorphic Evaluation of Database Queries. 203-216 - Melchizedek I. Alipio
, Nestor Michael C. Tiglao
:
A Cache-Aware Congestion Control for Reliable Transport in Wireless Sensor Networks. 217-230 - Mouza Ahmed Bani Shemaili, Chan Yeob Yeun
, Mohamed Jamal Zemerly
, Khalid Mubarak
, Hyun Ku Yeun, Yoon Seok Chang, Basim Zafar, Mohammed Simsim, Yasir Salih, Gaemyoung Lee:
A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources. 231-246 - Andrzej M. Goscinski, Zahir Tari, Izzatdin Abdul Aziz
, Eidah J. Alzahrani
:
Fog Computing as a Critical Link Between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs. 247-261 - Lukas Iffländer
, Christopher Metter, Florian Wamser, Phuoc Tran-Gia, Samuel Kounev:
Performance Assessment of Cloud Migrations from Network and Application Point of View. 262-276 - Zifan Liu, Qing Cai, Song Wang, Xiaolong Xu
, Wanchun Dou, Shui Yu
:
A Cloud Service Enhanced Method Supporting Context-Aware Applications. 277-290 - Wencheng Yang
, Guanglou Zheng, Ahmed Ibrahim
, Junaid Ahsenali Chaudhry, Song Wang
, Jiankun Hu
, Craig Valli
:
Application of 3D Delaunay Triangulation in Fingerprint Authentication System. 291-298 - Binrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma
:
The Public Verifiability of Public Key Encryption with Keyword Search. 299-312 - Baokun Zheng, Liehuang Zhu, Meng Shen
, Xiaojiang Du, Jing Yang, Feng Gao, Yandong Li, Chuan Zhang, Sheng Liu, Shu Yin:
Malicious Bitcoin Transaction Tracing Using Incidence Relation Clustering. 313-323 - Kakumani K. C. Deepthi, Kunwar Singh:
Cryptanalysis of Salsa and ChaCha: Revisited. 324-338 - Yandong Li, Liehuang Zhu, Meng Shen
, Feng Gao, Baokun Zheng, Xiaojiang Du, Sheng Liu, Shu Yin:
CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains. 339-352 - Thomas Marsden, Nour Moustafa
, Elena Sitnikova
, Gideon Creech:
Probability Risk Identification Based Intrusion Detection System for SCADA Systems. 353-363 - Sibghat Ullah Bazai
, Julian Jang-Jaccard
, Ruili Wang
:
Anonymizing k-NN Classification on MapReduce. 364-377 - Zhe Jin
, Jung Yeon Hwang, Soohyung Kim, Sangrae Cho, Yen-Lung Lai, Andrew Beng Jin Teoh
:
A Cancellable Ranking Based Hashing Method for Fingerprint Template Protection. 378-389

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.