-
3
-
-
20844436808
-
Collaborative internet worm containment
-
May/June
-
M. Cai, K. Hwang, Y. K. Kwok, S. Song, and Y. Chen, "Collaborative Internet Worm Containment", IEEE Security and Privacy, May/June 2005, pp. 25-33.
-
(2005)
IEEE Security and Privacy
, pp. 25-33
-
-
Cai, M.1
Hwang, K.2
Kwok, Y.K.3
Song, S.4
Chen, Y.5
-
6
-
-
79960590319
-
Secure data processing framework for mobile cloud computing
-
Shanghai
-
Huang, D., Zhou, Z., Xu, L., Xing, T., Zhong, Y.: Secure data processing framework for mobile cloud computing.: Proc. of the IEEE Conference on Computer Communications Workshop, Shanghai, pp. 614-618, 2011.
-
(2011)
Proc. of the IEEE Conference on Computer Communications Workshop
, pp. 614-618
-
-
Huang, D.1
Zhou, Z.2
Xu, L.3
Xing, T.4
Zhong, Y.5
-
8
-
-
77956356055
-
Trusted cloud computing with secure resources and data coloring
-
Sept
-
K. Hwang and D. Li, " Trusted Cloud Computing with Secure Resources and Data Coloring", IEEE Internet Computing, Vol. 14, Sept. 2010.
-
(2010)
IEEE Internet Computing
, vol.14
-
-
Hwang, K.1
Li, D.2
-
9
-
-
33847743856
-
Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
-
Jan-March
-
K. Hwang, M. Cai, Y. Chen, and M. Qin, "Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes", IEEE Trans. on Dependable and Secure Computing, Vol. 4, No. 1, Jan-March, 2007.
-
(2007)
IEEE Trans. on Dependable and Secure Computing
, vol.4
, Issue.1
-
-
Hwang, K.1
Cai, M.2
Chen, Y.3
Qin, M.4
-
10
-
-
84902532350
-
Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications
-
May 15
-
K. A. Khan; Q. Wang; C. Luo; X. Wang and C. Grecos, " Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications ", Proc. SPIE 9139, Real-Time Image and Video Processing May 15, 2014)
-
(2014)
Proc. SPIE 9139, Real-Time Image and Video Processing
-
-
Khan, K.A.1
Wang, Q.2
Luo, C.3
Wang, X.4
Grecos, C.5
-
11
-
-
84869201295
-
Beyond the client-server architectures: A survey of mobile cloud techniques
-
Beijing, China, August
-
D. Kovachev, R. Klamma, Beyond the client-server architectures: A survey of mobile cloud techniques, Proc. of the 1st IEEE International Conference on Communications (ICCC), Beijing, China, August 2012.
-
(2012)
Proc. of the 1st IEEE International Conference on Communications (ICCC)
-
-
Kovachev, D.1
Klamma, R.2
-
12
-
-
84894121008
-
An efficient distributed verification protocol for data storage security in cloud computing
-
Dec.
-
Kumar, P. S., Subramanian, R., Selvam, D. T., "An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing," Proc. IEEE 2nd International Conf. Advanced Computing, Networking and Security (ADCONS '13), pp. 214-219, Dec. 2013
-
(2013)
Proc. IEEE 2nd International Conf. Advanced Computing, Networking and Security (ADCONS '13)
, pp. 214-219
-
-
Kumar, P.S.1
Subramanian, R.2
Selvam, D.T.3
-
13
-
-
84901674515
-
Flying over mobile clouds with security planes: Select your class of sla for end-to-end security
-
M. Lacoste, A. Wailly Aymeric, and T. Loic, H. Xavier L. Guillou, and J. Wary "Flying Over Mobile Clouds with Security Planes: Select your Class of SLA for End-to-End Security," IEEE/ACM 6th International Conference on Utility and Cloud Computing, pp. 51-59, 2013
-
(2013)
IEEE/ACM 6th International Conference on Utility and Cloud Computing
, pp. 51-59
-
-
Lacoste, M.1
Wailly Aymeric, A.2
Loic, T.3
Xavier L Guillou, H.4
Wary, J.5
-
14
-
-
77956044597
-
Uncovering social spammers: Social honeypots + machine learning
-
N. Y.
-
K. Lee, J. Caverlee and S. Webb, "Uncovering Social Spammers: Social Honeypots + Machine Learning", Proc. of Int'l Conf. on Research and Dev. in Information Retrieval, ACM SIGIR-2010, N. Y., pp. 435-442.
-
Proc. of Int'l Conf. on Research and Dev. in Information Retrieval, ACM SIGIR-2010
, pp. 435-442
-
-
Lee, K.1
Caverlee, J.2
Webb, S.3
-
16
-
-
84893742056
-
Inter and intra cloud networking gateway as a service
-
Mechtri, M. Zeghlache, D.,Zekri, E. and Marshall, I. J., " Inter and intra Cloud Networking Gateway as a service," IEEE Int'l Conf. Cloud Networking (CloudNet '2013) pp. 156-163, 2013.
-
(2013)
IEEE Int'l Conf. Cloud Networking (CloudNet '2013)
, pp. 156-163
-
-
Mechtri1
Zeghlache D, M.2
Zekri, E.3
Marshall, I.J.4
-
17
-
-
84919816617
-
A collaborative intrusion detection and Prevention System in Cloud Computing
-
Sept
-
Mohamed, H., Adil, L.,Saida, T., and Hicham, M, "A collaborative intrusion detection and Prevention System in Cloud Computing," Proc. IEEE Conf. AFRICON, Sept 2013.
-
(2013)
Proc. IEEE Conf. AFRICON
-
-
Mohamed, H.1
Adil, L.2
Saida, T.3
Hicham, M.4
-
18
-
-
84939500464
-
Mobile cloud computing: A survey, state of art and future directions
-
Nov
-
M. Reza Rahimi, Jian Ren, Chi Harold Liu, Athanasios V. Vasilakos, and Nalini Venkatasubramanian, "Mobile Cloud Computing: A Survey, State of Art and Future Directions", in ACM/Springer Mobile Application and Networks (MONET), Speciall Issue on Mobile Cloud Computing, Nov. 2013.
-
(2013)
ACM/Springer Mobile Application and Networks (MONET), Speciall Issue on Mobile Cloud Computing
-
-
Reza Rahimi, M.1
Ren, J.2
Harold Liu, C.3
Vasilakos, A.V.4
Venkatasubramanian, N.5
-
19
-
-
77956609298
-
Virtualized in-cloud security service for mobile devices
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, F. Jahanian, "Virtualized In-Cloud Security Service for Mobile Devices," ACM Proceedings of the First Workshop on Virtualization in Mobile Computing, pp 31-35, 2008
-
(2008)
ACM Proceedings of the First Workshop on Virtualization in Mobile Computing
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
20
-
-
70350136710
-
The case for vm-based cloudlets in mobile computing
-
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, "The Case for VM-Based Cloudlets in Mobile Computing," IEEE Pervasive Computing, vol. 8, no. 4, pp. 14-23, 2009.
-
(2009)
IEEE Pervasive Computing
, vol.8
, Issue.4
, pp. 14-23
-
-
Satyanarayanan, M.1
Bahl, P.2
Caceres, R.3
Davies, N.4
-
22
-
-
84883726912
-
Security and privacy in mobile cloud computing
-
H. Suo, Z. Liu, J. Wan, and K. Zhou, "Security and privacy in mobile cloud computing," in Proceedings of the 9th International Wireless Communications and Mobile Computing Conference (IWCMC '13), pp. 655-659
-
Proceedings of the 9th International Wireless Communications and Mobile Computing Conference (IWCMC '13)
, pp. 655-659
-
-
Suo, H.1
Liu, Z.2
Wan, J.3
Zhou, K.4
-
24
-
-
84881080693
-
An efficient and secure dynamic auditing protocol for data storage in cloud computing
-
Sep
-
K. Yang and X. Jia, "An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing," IEEE Trans. Parallel and Distributed Systems, vol. 24, Issue. 9, pp. 17171726, Sep 2013. .
-
(2013)
IEEE Trans. Parallel and Distributed Systems
, vol.24
, Issue.9
, pp. 17171726
-
-
Yang, K.1
Jia, X.2
-
25
-
-
34047150751
-
Powertrust: A robust and scalable reputation system for trusted p2p computing
-
April
-
R. Zhou and K. Hwang, "PowerTrust: A Robust and Scalable Reputation System for Trusted P2P Computing", IEEE Trans. on Parallel and Distributed Systems, April, 2007.
-
(2007)
IEEE Trans. on Parallel and Distributed Systems
-
-
Zhou, R.1
Hwang, K.2
|