Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
402 authors
- Adel, Alkhalil
- Migration to Cloud Computing- The Impact on IT Management and Security
- Aiqun, Hu
- A Lightweight Inter-domain Direct Anonymous Attestation Scheme for Machine-to-Machine Networks
- Arabi, E. keshk
- An Ant Algorithm for Cloud Task Scheduling
- Ashraf, El-Sisi
- An Ant Algorithm for Cloud Task Scheduling
- Bai, Jian
- Improved Homomorphic String Bits Encryption Public-key Cryptosystem based on LWE
- Baimu, Yu
- A Probabilistic Encryption Way in Knapsack PKC
- Bao, Wen-xing
- Application of Cloud Manufacturing based on the principle of Process-Aware Information System
- Baomin, Wang
- An Efficient Scheme of Multi-user Searchable Encryption with Keyword in Cloud Storage
- Bei, Jia
- Research of a MapReduce Communication Data Stream Processing Model
- Bin, Yu
- Study on Cloud Computing Data Center Infrastructure Best Practices
- Bo, He
- A method for designing Hash function based on chaotic neural network
- Bowen, Yuan
- A replica pre-placement strategy based on correlation analysis in cloud environment
- Boya, Zhao
- A Design and Application of Tilt Angle Algorithm Based on the 3-axis Acceleration Sensor
- Can, Wang
- Intelligent Resources Dispatching System of Urban Emergency Based on SOA and Cloud Computing
- Canyan, Zhu
- A Detecting and Defending Method of Wormhole Attack Based on Time Ruler
- Changfei, Zhou
- MIC Acceleration of Saliency Detection Algorithm
- Chaoyuan, Cui
- VMPmonitor: An Efficient Modularity Approach for Hidden Process Detection
- Charles, Z.-Z. Liu
- Initially Cognitive Computation with Self-Organization Strategy for Securely Humanized Human-Machine Interactions
- Chen, Guilin
- Dependability Modelling and Evaluation of Cyber-Physical Systems: A Model-Driven Perspective
- Chen, Hua-sha
- Based on PSO cloud computing server points location searching
- Chen, Li
- A Mechanism for Dependability Processing of Information Flow in Cloud Computing
- Chen, Lu
- Review of Aircraft Aerodynamic Force Parameters Identification based on the Intelligent Algorithm
- Chen, Lu
- The digital library cloud storage based on Hadoop
- Chen, Ningjiang
- On User Capacity Optimization Strategy of Server Computing Based Desktop Cloud
- Chen, Xiaojun
- A Real-Time Authentication Method Based on Cursor-hidden Scene
- Chen, Yong-qiang
- Active Defense strategies selection for network mixed malicious action
- Chen, Zhi yun
- Based on PSO cloud computing service discovering
- ChengDong, Xu
- Design Task Modeling and Task Allocation Method Research Based Multi-granularity Space in Distributed Network Environment
- Chengqi, Yi
- Online Community Perceiving Method on Social Network
- Chengyu, Tan
- Mimicking User Keystrokes to Detect Keyloggers with Dendritic Cell Algorithm
- Chengzhi, Cao
- Vulnerability Mining Techniques in Android Platform
- Chi, YaPing
- Research on Authentication Method for Virtual Desktop System based on CPK
- Chien-Sing, Lee
- PeANFIS-FARM Framework in Defending against Web Service Attacks
- Chongguo, Wang
- Distributed Hybrid Cloud Architecture Based on China Education Research Network for Common Computer Test
- Chun, Liu
- A Cloud-based China s Landslide Disaster Database (CCLDD) Development and Analysis
- ChunSheng, Hu
- Design Task Modeling and Task Allocation Method Research Based Multi-granularity Space in Distributed Network Environment
- Chunping, Zhang
- OPC:An Effective Memory Computing Solution of Big Data For PC
- Chunyan, Hu
- The Study of Improved FP-Growth Algorithm in MapReduce
- Cong, Xu
- Deployment and Performance Evaluation of Virtual Network based on OpenStack
- Cuilan, Du
- The Secrets of Skype Login
- David, John
- Migration to Cloud Computing- The Impact on IT Management and Security
- Dawu, Gu
- An Improved Scheme for Range Queries on Encrypted Data
- Diming, Zhang
- Design and Implementation of Data Encryption in Cloud based on HDFS
- Divya, Bansal
- Bivariate Classification of Malware in JavaScript using Dynamic Analysis
- Divya, Bansal
- Security Vulnerabilities in SAML based Single Sign-On Authentication in Cloud
- Donghai, Zhu
- A Strategy of Dynamic Replica Creation in Cloud Storage
- Fan, Liu
- A Group Based Identity Anonymity and Secure Cloud Storage Scheme
- Fang, Lu-lu
- The Research and Design of Cloud Computing Framework Model Based on SOA
- Fang-Juan, Zhang
- A new SS-closedness in L-topological spaces
- Fangbiao, Li
- Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper
- Fangbiao, Li
- Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication
- Fangbiao, Li
- Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination
- Fawzy, A. Torkey
- An Ant Algorithm for Cloud Task Scheduling
- Fei, Liu
- Architectural Support for Lease-Regulated Secret Data
- Fei, Qiao
- Research and application of the location information in the intelligent transportation
- Feng, Lin
- OPC:An Effective Memory Computing Solution of Big Data For PC
- Feng, Xu
- The SLA Framework Based on Cloud Computing
- Fu, Yu
- Active Defense strategies selection for network mixed malicious action
- Fu-gui, Luo
- IPv6 marked packets preprocessing scheme research based on Hash table
- Gaik-Yee, Chan
- PeANFIS-FARM Framework in Defending against Web Service Attacks
- Gang, Shi
- Distributed Hybrid Cloud Architecture Based on China Education Research Network for Common Computer Test
- Genqing, Bian
- Research of Replica Replacement Strategy Oriented Cloud Storage
- Gong, Jian
- Detecting Machine Generated Domain Names Based on Morpheme Features
- Guiqing, Du
- Short-term Load forecasting by a new hybrid model
- Guo-Chun, Tang
- Research on the Model for Cloud Security Based on SLA
- Guoan, Zhang
- Robust cepstrum device fingerprint of proximity coupling RFID tags
- Guofang, Yu
- Multi-Sub-Swarm PSO Classifier Design and Rule Extraction
- Guohao, Liu
- Cryptographic classification of quasigroups of order 4
- Guoyuan, Lv
- A Detecting and Defending Method of Wormhole Attack Based on Time Ruler
- HU, Baofang
- The Application of Cloud Computing in Large-Scale Statistic
- Haihe, Ba
- TEM: A Novel Measurement Method for Java Applications on demand in Cloud Computing
- Haijia, Wu
- A method based on compressive sensing to detect community structure using deep belief network
- Haining, Lu
- An Improved Scheme for Range Queries on Encrypted Data
- Haiquan, Xiong
- The Architectural Based Interception and Identification of System Call Instruction within VMM
- Han, Qiang
- Application of Cloud Manufacturing based on the principle of Process-Aware Information System
- Hao, Huang
- Design and Implementation of Data Encryption in Cloud based on HDFS
- Hao, Liu
- A Mechanism for Dependability Processing of Information Flow in Cloud Computing
- Hehong, Guo
- Short-term Load forecasting by a new hybrid model
- Hengjing, He
- Future trend of integrating instrumentation into the cloud
- Hequn, Xian
- Dynamic Constraint Definition Method in Cloud Databases
- Hong, Sun
- The Study of Improved FP-Growth Algorithm in MapReduce
- Hong, Zhou
- A Trusted VM-vTPM Live Migration Protocol in Clouds
- Hongbo, Wang
- The digital library cloud storage based on Hadoop
- Hongjun, Chen
- The Research on Information Collection and Retrieval Technology of Big Data based Cloud Computing
- Hongjun, Chen
- The Applied Research on the Virtualization Technology in Cloud Computing
- Hongliang, Liang
- Access Control Framework for Android System
- Honglin, Yuan
- Robust cepstrum device fingerprint of proximity coupling RFID tags
- Hongtao, Bai
- Architectural Support for Lease-Regulated Secret Data
- Hou, Zhan-sheng
- The Design and Realization of the Test Scheme OpenVPN, Based on Message Simulation
- Hu, Bin
- The Design and Realization of the Test Scheme OpenVPN, Based on Message Simulation
- Hu, Dandan
- On User Capacity Optimization Strategy of Server Computing Based Desktop Cloud
- Hu, Hai-rong
- The Research and Design of Cloud Computing Framework Model Based on SOA
- Hu, Jinlong
- Study of Cloud Computing Security System Based on Rotational Stations
- Hu, Xiaojing
- Dependability Modelling and Evaluation of Cyber-Physical Systems: A Model-Driven Perspective
- Hua-yu, Shi
- Design of a Wireless Networks Detection and Management System Based on a Mobile Terminal
- Huan, Yang
- Mimicking User Keystrokes to Detect Keyloggers with Dendritic Cell Algorithm
- HuanGuo, Zhang
- A Trusted VM-vTPM Live Migration Protocol in Clouds
- Huang, Gaofeng
- Design and Implementation of the Monitoring System for Critical Documents
- Huaxuan, Zhang
- The Study of Improved FP-Growth Algorithm in MapReduce
- Hui, Zhang
- Emergency-cloud a new idea about the construction of emergency platform in