|
The 11th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2018) |
|
|
|
Protecting Your Smartphone from Theft Using Accelerometer |
|
|
3 | (12) |
|
|
|
|
SOS - Securing Open Skies |
|
|
15 | (18) |
|
|
|
DNS Traffic of a Tor Exit Node - An Analysis |
|
|
33 | (13) |
|
|
SDN-Based Secure VANETs Communication with Fog Computing |
|
|
46 | (14) |
|
|
|
|
|
Wearable Device Data for Criminal Investigation |
|
|
60 | (12) |
|
|
|
Authentication of Skyline Query over Road Networks |
|
|
72 | (12) |
|
|
|
|
|
|
A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing |
|
|
84 | (14) |
|
|
|
|
Processing Analysis of Confidential Modes of Operation |
|
|
98 | (17) |
|
|
|
|
The 4th International Symposium on Sensor-Cloud Systems (SCS 2018) |
|
|
|
Matching Sensor Ontologies Through Compact Evolutionary Tabu Search Algorithm |
|
|
115 | (10) |
|
|
|
Event-Triggered Fault-Detection Filter Using Coordinate Transformation Approach for Time-Varying Stochastic Systems |
|
|
125 | (11) |
|
|
|
|
|
Indoor Interference Classification Based on WiFi Channel State Information |
|
|
136 | (10) |
|
|
|
|
|
Secure and Privacy Preserving RFID Based Access Control to Smart Buildings |
|
|
146 | (10) |
|
|
|
|
|
Answering the Min-Cost Quality-Aware Query on Multi-sources in Sensor-Cloud Systems |
|
|
156 | (10) |
|
|
|
|
|
Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment |
|
|
166 | (12) |
|
|
|
|
|
|
A Four-Stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Coverage |
|
|
178 | (14) |
|
|
|
|
Application of Sensor-Cloud Systems: Smart Traffic Control |
|
|
192 | (11) |
|
|
|
|
Strategy-Proof Mechanism for Provisioning Non-obedient Resources Without Payment |
|
|
203 | (16) |
|
|
|
|
The 4th International Symposium on Dependability in Sensor, Cloud and Big Data Systems and Applications (DependSys 2018) |
|
|
|
Risk Identification-Based Association Rule Mining for Supply Chain Big Data |
|
|
219 | (10) |
|
|
|
|
|
TrCMP: An App Usage Inference Method for Mobile Service Enhancement |
|
|
229 | (11) |
|
|
|
|
|
|
|
A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replication |
|
|
240 | (11) |
|
|
|
|
|
|
Cloud Enabled e-Glossary System: A Smart Campus Perspective |
|
|
251 | (10) |
|
Musaddiq Majid Khan Al-Nadwi |
|
|
|
|
|
|
|
A Dynamic Integrity Transitivity Model for the Cloud |
|
|
261 | (11) |
|
|
|
|
Enhancing Dependability in Big Data Analytics Enterprise Pipelines |
|
|
272 | (10) |
|
|
|
|
Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective |
|
|
282 | (12) |
|
|
|
|
|
|
|
CRAB: Blockchain Based Criminal Record Management System |
|
|
294 | (10) |
|
|
|
|
|
Secure Passive Keyless Entry and Start System Using Machine Learning |
|
|
304 | (15) |
|
|
|
|
|
|
The 10th International Symposium on UbiSafe Computing (UbiSafe 2018) |
|
|
|
Towards New Privacy Regulations in Europe: Users' Privacy Perception in Recommender Systems |
|
|
319 | (12) |
|
|
|
|
|
SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing |
|
|
331 | (10) |
|
|
|
|
|
|
NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion |
|
|
341 | (10) |
|
|
|
|
|
|
BDCP: A Framework for Big Data Copyright Protection Based on Digital Watermarking |
|
|
351 | (10) |
|
|
|
|
|
|
A Privacy-Preserving Attribute-Based Access Control Scheme |
|
|
361 | (10) |
|
|
|
|
|
|
|
Checking an Authentication of Person Depends on RFID with Thermal Image |
|
|
371 | (10) |
|
|
|
|
|
Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks |
|
|
381 | (11) |
|
|
|
|
|
|
An Efficient Provable Multi-copy Data Possession Scheme with Data Dynamics |
|
|
392 | (15) |
|
|
|
|
|
|
The 7th International Symposium on Security and Privacy on Internet of Things (SPIoT 2018) |
|
|
|
An Enhanced Key Management Scheme for LoRaWAN |
|
|
407 | (10) |
|
|
|
Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics |
|
|
417 | (11) |
|
|
|
|
A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems |
|
|
428 | (15) |
|
|
|
|
|
Interacting with the Internet of Things Using Smart Contracts and Blockchain Technologies |
|
|
443 | (14) |
|
|
|
|
The 9th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2018) |
|
|
|
Research on Multi-focus Image Fusion Algorithm Based on Quadtree |
|
|
457 | (8) |
|
|
|
|
|
|
Uncertainty Evaluation for Big Data of Mass Standards in a Key Comparison |
|
|
465 | (7) |
|
|
|
|
Research on Wireless Spectrum Sensing Technology Based on Machine Learning |
|
|
472 | (13) |
|
|
|
|
The 10th International Workshop on Security in e-Science and e-Research (ISSR 2018) |
|
|
|
A Novel Method for Bearing Safety Detection in Urban Rail Transit Based on Deep Learning |
|
|
485 | (12) |
|
|
|
|
Malicious Domain Name Recognition Based on Deep Neural Networks |
|
|
497 | (14) |
|
|
|
|
The 8th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2018) |
|
|
|
Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals |
|
|
511 | (11) |
|
|
|
|
|
E2STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks |
|
|
522 | (11) |
|
|
|
|
Author Index |
|
533 | |