Login / Signup
TrustCom/BigDataSE/ISPA (1)
2015
2015
2015
Keyphrases
Publications
2015
Catia Prandi
,
Stefano Ferretti
,
Silvia Mirri
,
Paola Salomoni
A Trustworthiness Model for Crowdsourced and Crowdsensed Data.
TrustCom/BigDataSE/ISPA (1)
(2015)
Mohammad Reza Memarian
,
Mauro Conti
,
Ville Leppänen
EyeCloud: A BotCloud Detection System.
TrustCom/BigDataSE/ISPA (1)
(2015)
Cengiz Örencik
,
Mahmoud Alewiwi
,
Erkay Savas
Secure Sketch Search for Document Similarity.
TrustCom/BigDataSE/ISPA (1)
(2015)
Christiaan Hillen
The Pseudonym Broker Privacy Pattern in Medical Data Collection.
TrustCom/BigDataSE/ISPA (1)
(2015)
Alessandro Aldini
,
Jean-Marc Seigneur
,
Carlos Ballester Lafuente
,
Xavier Titi
,
Jonathan Guislain
Formal Modeling and Verification of Opportunity-enabled Risk Management.
TrustCom/BigDataSE/ISPA (1)
(2015)
Raja Naeem Akram
,
Konstantinos Markantonakis
,
Damien Sauveron
,
Keith Mayes
Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures.
TrustCom/BigDataSE/ISPA (1)
(2015)
Vladimir Estivill-Castro
,
David F. Nettleton
Can On-line Social Network Users Trust That What They Designated as Confidential Data Remains So?
TrustCom/BigDataSE/ISPA (1)
(2015)
Julian Horsch
,
Sascha Wessel
Transparent Page-Based Kernel and User Space Execution Tracing from a Custom Minimal ARM Hypervisor.
TrustCom/BigDataSE/ISPA (1)
(2015)
Hao Xue
,
Fengjun Li
,
Hyunjin Seo
,
Roseann Pluretti
Trust-Aware Review Spam Detection.
TrustCom/BigDataSE/ISPA (1)
(2015)
Baden Delamore
,
Ryan K. L. Ko
A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications.
TrustCom/BigDataSE/ISPA (1)
(2015)
Keita Emura
,
Le Trieu Phong
,
Yohei Watanabe
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability.
TrustCom/BigDataSE/ISPA (1)
(2015)
Ali Farooq
,
Johanna Isoaho
,
Seppo Virtanen
,
Jouni Isoaho
Information Security Awareness in Educational Institution: An Analysis of Students' Individual Factors.
TrustCom/BigDataSE/ISPA (1)
(2015)
Seung-Hyun Kim
,
Han-Gyu Ko
,
In-Young Ko
,
Daeseon Choi
Effects of Contextual Properties on Users' Privacy Preferences in Mobile Computing Environments.
TrustCom/BigDataSE/ISPA (1)
(2015)
Xiaoming Zheng
,
Yan Wang
,
Mehmet A. Orgun
Contextual Sub-network Extraction in Contextual Social Networks.
TrustCom/BigDataSE/ISPA (1)
(2015)
Yuri Ohata
,
Sayaka Umeda
,
Takashi Kamimoto
,
Hiroshi Shigeno
Secure Routing Protocol Considering Load Distribution in Mobile Ad Hoc Networks.
TrustCom/BigDataSE/ISPA (1)
(2015)
Ahmed Bouchami
,
Elio Goettelmann
,
Olivier Perrin
,
Claude Godart
Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms.
TrustCom/BigDataSE/ISPA (1)
(2015)
Daniel Gonçalves
,
Joao Bota
,
Miguel Correia
Big Data Analytics for Detecting Host Misbehavior in Large Logs.
TrustCom/BigDataSE/ISPA (1)
(2015)
Huan Zhao
,
Chaoming Hu
,
Rui Zheng
,
Bin Lv
Study on the Coverage of Adaptive Wireless Sensor Network Based on Trust.
TrustCom/BigDataSE/ISPA (1)
(2015)
Huanyang Zheng
,
Jie Wu
DynFluid: Predicting Time-Evolving Rating in Recommendation Systems via Fluid Dynamics.
TrustCom/BigDataSE/ISPA (1)
(2015)
2015 IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1
TrustCom/BigDataSE/ISPA (1)
(2015)
Hui Peng
,
Xiaoying Zhang
,
Hong Chen
,
Yuncheng Wu
,
Yao Wu
,
Juru Zeng
Enable Privacy Preservation and Result Verification for Top-k Query in Two-Tiered Sensor Networks.
TrustCom/BigDataSE/ISPA (1)
(2015)
Kok-Seng Wong
,
Minjie Seo
,
Myung Ho Kim
Secure Two-Party Rank Correlation Computations for Recommender Systems.
TrustCom/BigDataSE/ISPA (1)
(2015)
Lars Baumgärtner
,
Jonas Hochst
,
Matthias Leinweber
,
Bernd Freisleben
How to Misuse SMTP over TLS: A Study of the (In) Security of Email Server Communication.
TrustCom/BigDataSE/ISPA (1)
(2015)
Maryam Sepehri
,
Stelvio Cimato
,
Ernesto Damiani
,
Chan Yeob Yeun
Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries.
TrustCom/BigDataSE/ISPA (1)
(2015)
Emmanouil A. Panaousis
,
Aron Laszka
,
Johannes Pohl
,
Andreas Noack
,
Tansu Alpcan
Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking.
TrustCom/BigDataSE/ISPA (1)
(2015)
Zhengping Wu
,
Lifeng Wang
Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria Analysis.
TrustCom/BigDataSE/ISPA (1)
(2015)
Felix Immanuel
,
Ben Martini
,
Kim-Kwang Raymond Choo
Android Cache Taxonomy and Forensic Process.
TrustCom/BigDataSE/ISPA (1)
(2015)
Nada Alruhaily
,
Behzad Bordbar
,
Tom Chothia
Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection.
TrustCom/BigDataSE/ISPA (1)
(2015)
Dongxi Liu
,
John Zic
Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators.
TrustCom/BigDataSE/ISPA (1)
(2015)
Kim Thuat Nguyen
,
Nouha Oualha
,
Maryline Laurent
Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things.
TrustCom/BigDataSE/ISPA (1)
(2015)
Ismail Adel Al-Taharwa
,
Hahn-Ming Lee
,
Albert B. Jeng
,
Cheng-Seen Ho
,
Kuo-Ping Wu
,
Shyi-Ming Chen
Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction.
TrustCom/BigDataSE/ISPA (1)
(2015)
Daniel M. Hein
,
Johannes Winter
,
Andreas Fitzek
Secure Block Device - Secure, Flexible, and Efficient Data Storage for ARM TrustZone Systems.
TrustCom/BigDataSE/ISPA (1)
(2015)
Jianming Fu
,
Xu Zhang
,
Yan Lin
An Instruction-Set Randomization Using Length-Preserving Permutation.
TrustCom/BigDataSE/ISPA (1)
(2015)
Haining Meng
,
Xinhong Hei
,
Yan Li
,
Yanning Du
,
Guo Xie
A Rejuvenation Model for Software System under Normal Attack.
TrustCom/BigDataSE/ISPA (1)
(2015)
Igor V. Kotenko
,
Igor Saenko
,
Sergey Ageev
Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference.
TrustCom/BigDataSE/ISPA (1)
(2015)
Sampsa Rauti
,
Jukka Teuhola
,
Ville Leppänen
Diversifying SQL to Prevent Injection Attacks.
TrustCom/BigDataSE/ISPA (1)
(2015)
Jiaojiao Song
,
Xiaohong Li
,
Jing Hu
,
Guangquan Xu
,
Zhiyong Feng
Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor.
TrustCom/BigDataSE/ISPA (1)
(2015)
Ming Xiang
,
William Liu
,
Quan Bai
,
Adnan Al-Anbuky
Simmelian Ties and Structural Holes: Exploring Their Topological Roles in Forming Trust for Securing Wireless Sensor Networks.
TrustCom/BigDataSE/ISPA (1)
(2015)
Ronan-Alexandre Cherrueau
,
Rémi Douence
,
Mario Südholt
A Language for the Composition of Privacy-Enforcement Techniques.
TrustCom/BigDataSE/ISPA (1)
(2015)
Nicolae Paladi
,
Christian Gehrmann
Towards Secure Multi-tenant Virtualized Networks.
TrustCom/BigDataSE/ISPA (1)
(2015)
Jiao Jiao Jiang
,
Andi Zhou
,
Kasra Majbouri Yazdi
,
Sheng Wen
,
Shui Yu
,
Yang Xiang
Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach.
TrustCom/BigDataSE/ISPA (1)
(2015)
Gyan Singh Yadav
,
Aparajita Ojha
A Scalable Data Hiding Scheme Using Hilbert Space Curve and Chaos.
TrustCom/BigDataSE/ISPA (1)
(2015)
Bingchen Lan
,
Yan Li
,
Hao Sun
,
Chao Su
,
Yao Liu
,
Qingkai Zeng
Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses.
TrustCom/BigDataSE/ISPA (1)
(2015)
Abdullah Mohammed Almuhaideb
,
Bala Srinivasan
,
Phu Dung Le
,
Mohammed A. Alhabeeb
,
Waleed Alfehaid
A Hybrid Mobile Authentication Model for Ubiquitous Networking.
TrustCom/BigDataSE/ISPA (1)
(2015)
Jukka A. Koskinen
Surveys of Daily Information Security of Citizens in Finland.
TrustCom/BigDataSE/ISPA (1)
(2015)
Kenta Muranaka
,
Naoto Yanai
,
Shingo Okamura
,
Toru Fujiwara
Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers.
TrustCom/BigDataSE/ISPA (1)
(2015)
Midhun Babu Tharayanil
,
Gill Whitney
,
Mahdi Aiash
,
Chafika Benzaid
Virtualization and Cyber Security: Arming Future Security Practitioners.
TrustCom/BigDataSE/ISPA (1)
(2015)
Po-Hung Yang
,
Sung-Ming Yen
Memory Attestation of Wireless Sensor Nodes by Trusted Local Agents.
TrustCom/BigDataSE/ISPA (1)
(2015)
Shigui Qi
,
Dan Feng
,
Nan Su
,
Wenguo Liu
,
Jingning Liu
A New Solution Based on Multi-rate LDPC for Flash Memory to Reduce ECC Redundancy.
TrustCom/BigDataSE/ISPA (1)
(2015)
Olof Görnerup
,
Nima Dokoohaki
,
Andrea Hess
Privacy-Preserving Mining of Frequent Routes in Cellular Network Data.
TrustCom/BigDataSE/ISPA (1)
(2015)