|
Networks and System Architecture |
|
|
|
Reducing Keepalive Traffic in Software-Defined Mobile Networks with Port Control Protocol |
|
|
3 | (10) |
|
|
|
|
A SDN Based Method of TCP Connection Handover |
|
|
13 | (7) |
|
|
|
|
IP Data Delivery in HBB-Next Network Architecture |
|
|
20 | (10) |
|
|
|
|
|
|
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter |
|
|
30 | (10) |
|
|
|
|
|
Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure |
|
|
40 | (13) |
|
|
|
|
|
|
|
|
Making Computer Science Education Relevant |
|
|
53 | (11) |
|
|
Analyzing Brain Waves for Activity Recognition of Learners |
|
|
64 | (13) |
|
|
|
|
|
|
Authentication and Profiling |
|
|
|
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation |
|
|
77 | (12) |
|
|
|
|
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History |
|
|
89 | (10) |
|
|
|
|
Data Management and Information Advertising |
|
|
|
Strength of Relationship Between Multi-labeled Data and Labels |
|
|
99 | (10) |
|
|
|
Online Ad-fraud in Search Engine Advertising Campaigns: Prevention, Detection and Damage Limitation |
|
|
109 | (12) |
|
|
|
|
Applied Modeling and Simulation |
|
|
|
Markov Chain Solution to the 3-Tower Problem |
|
|
121 | (8) |
|
|
Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem |
|
|
129 | (10) |
|
|
|
|
Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons |
|
|
139 | (12) |
|
|
|
|
|
|
|
Can We Securely Use CBC Mode in TLS1.0? |
|
|
151 | (10) |
|
|
|
|
Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks |
|
|
161 | (12) |
|
|
|
Secure Mobility Management for MIPv6 with Identity-Based Cryptography |
|
|
173 | (6) |
|
|
|
|
Investigation of DDoS Attacks by Hybrid Simulation |
|
|
179 | (14) |
|
|
|
|
|
Dependable Systems and Applications |
|
|
|
Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function |
|
|
193 | (10) |
|
|
|
|
An Approach for Evaluating Softgoals Using Weight |
|
|
203 | (10) |
|
|
An Efficient Unsavory Data Detection Method for Internet Big Data |
|
|
213 | (8) |
|
|
|
|
|
|
|
Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments |
|
|
221 | (8) |
|
|
|
|
|
|
Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from Image Display Device |
|
|
229 | (6) |
|
|
|
A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions |
|
|
235 | (8) |
|
|
|
|
Secure Image Deduplication in Cloud Storage |
|
|
243 | (12) |
|
|
|
|
|
|
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse |
|
|
255 | (10) |
|
|
|
|
|
Differential Fault Attack on LEA |
|
|
265 | (10) |
|
|
|
A Secure Multicast Key Agreement Scheme |
|
|
275 | (7) |
|
|
|
Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution: Extended Abstract |
|
|
282 | (7) |
|
|
|
|
|
|
|
|
DCODE: A Distributed Column-Oriented Database Engine for Big Data Analytics |
|
|
289 | (11) |
|
|
|
|
|
|
|
|
|
|
|
|
Incorporating Big Data Analytics into Enterprise Information Systems |
|
|
300 | (10) |
|
|
|
|
Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment |
|
|
310 | (13) |
|
|
|
|
|
|
Social Impact of EIS and Visualization |
|
|
|
Corporate Social Responsibility in Social Media Environment |
|
|
323 | (10) |
|
|
|
Usage of Finance Information Systems in Developing Countries: Identifying Factors During Implementation that Impact Use |
|
|
333 | (10) |
|
|
|
|
Software Model Creation with Multidimensional UML |
|
|
343 | (10) |
|
|
|
Author Index |
|
353 | |