-
1
-
-
85028345951
-
Knowledge-aware proactive nodes selection approach for energy management in Internet of Things
-
Liu, X., Zhao, S., Liu, A., Xiong, N., Vasilakos, A.V., Knowledge-aware proactive nodes selection approach for energy management in Internet of Things. Future Gener. Comput. Syst., 2017, 10.1016/j.future.2017.07.022.
-
(2017)
Future Gener. Comput. Syst.
-
-
Liu, X.1
Zhao, S.2
Liu, A.3
Xiong, N.4
Vasilakos, A.V.5
-
2
-
-
85059047985
-
Context-aware collect data with energy efficient in cyber-physical cloud systems
-
Liu, Y., Liu, A., Guo, S., Li, Z., Choi, Y.-J., Sekiya, H., Context-aware collect data with energy efficient in cyber-physical cloud systems. Future Gener. Comput. Syst., 2017, 10.1016/j.future.2017.05.029.
-
(2017)
Future Gener. Comput. Syst.
-
-
Liu, Y.1
Liu, A.2
Guo, S.3
Li, Z.4
Choi, Y.-J.5
Sekiya, H.6
-
3
-
-
85020892568
-
Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study
-
Cahyani, N.D.W., Martini, B., Choo, K.-K.R., Al-Azhar, A., Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study. Concurr. Comput.: Pract. Exper. 29:14 (2017), 1–16.
-
(2017)
Concurr. Comput.: Pract. Exper.
, vol.29
, Issue.14
, pp. 1-16
-
-
Cahyani, N.D.W.1
Martini, B.2
Choo, K.-K.R.3
Al-Azhar, A.4
-
4
-
-
84920152770
-
Distributed filesystem forensics: XtreemFS as a case study
-
Martini, B., Choo, K.-K.R., Distributed filesystem forensics: XtreemFS as a case study. Digit. Investigation 11:4 (2014), 295–313.
-
(2014)
Digit. Investigation
, vol.11
, Issue.4
, pp. 295-313
-
-
Martini, B.1
Choo, K.-K.R.2
-
5
-
-
85011545453
-
Visualizing digital forensic datasets: a proof of concept
-
Tassone, C.F., Martini, B., Choo, K.-K.R., Visualizing digital forensic datasets: a proof of concept. J. Forensic Sci. 62:5 (2017), 1197–1204.
-
(2017)
J. Forensic Sci.
, vol.62
, Issue.5
, pp. 1197-1204
-
-
Tassone, C.F.1
Martini, B.2
Choo, K.-K.R.3
-
6
-
-
85002778113
-
Digital forensics in the cloud era: the decline of passwords and the need for legal reform
-
Martini, B., Do, Q., Raymond Choo, K.-K., Digital forensics in the cloud era: the decline of passwords and the need for legal reform. Trends Issues Crime Criminal Justice 1:512 (2016), 1–16.
-
(2016)
Trends Issues Crime Criminal Justice
, vol.1
, Issue.512
, pp. 1-16
-
-
Martini, B.1
Do, Q.2
Raymond Choo, K.-K.3
-
7
-
-
84875587046
-
Cloud computing and its implications for cybercrime investigations in australia
-
Hooper, C., Martini, B., Choo, K.-K.R., Cloud computing and its implications for cybercrime investigations in australia. Comput. Law Secur. Rev. 29:2 (2013), 152–163.
-
(2013)
Comput. Law Secur. Rev.
, vol.29
, Issue.2
, pp. 152-163
-
-
Hooper, C.1
Martini, B.2
Choo, K.-K.R.3
-
8
-
-
85009512540
-
Digital forensic intelligence: data subsets and open source intelligence (DFINT+ OSINT): a timely and cohesive mix
-
Quick, D., Choo, K.-K.R., Digital forensic intelligence: data subsets and open source intelligence (DFINT+ OSINT): a timely and cohesive mix. Future Gener. Comput. Syst. 78 (2018), 558–567.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 558-567
-
-
Quick, D.1
Choo, K.-K.R.2
-
9
-
-
84994100951
-
Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study
-
Teing, Y.-Y., Dehghantanha, A., Choo, K.-K.R., Yang, L.T., Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study. Comput. Electr. Eng. 58 (2017), 350–363.
-
(2017)
Comput. Electr. Eng.
, vol.58
, pp. 350-363
-
-
Teing, Y.-Y.1
Dehghantanha, A.2
Choo, K.-K.R.3
Yang, L.T.4
-
10
-
-
85029605430
-
A foggy research future: Advances and future opportunities in fog computing research
-
Choo, K.-K.R., Lu, R., Chen, L., Yi, X., A foggy research future: Advances and future opportunities in fog computing research. Future Gener. Comput. Syst. 78 (2018), 677–697.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 677-697
-
-
Choo, K.-K.R.1
Lu, R.2
Chen, L.3
Yi, X.4
-
11
-
-
85026636505
-
From cloud to fog computing: A review and a conceptual live VM migration framework
-
Osanaiye, O., Chen, S., Yan, Z., Lu, R., Choo, K., Dlodlo, M., From cloud to fog computing: A review and a conceptual live VM migration framework. IEEE Access 5:99 (2017), 8284–8300.
-
(2017)
IEEE Access
, vol.5
, Issue.99
, pp. 8284-8300
-
-
Osanaiye, O.1
Chen, S.2
Yan, Z.3
Lu, R.4
Choo, K.5
Dlodlo, M.6
-
12
-
-
84987842183
-
Edgecomputing: Vision and challenges
-
Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L., Edgecomputing: Vision and challenges. IEEE Internet Things J. 3:5 (2016), 637–646.
-
(2016)
IEEE Internet Things J.
, vol.3
, Issue.5
, pp. 637-646
-
-
Shi, W.1
Cao, J.2
Zhang, Q.3
Li, Y.4
Xu, L.5
-
13
-
-
84975761150
-
Survey on secure cloud storage
-
Xiao, L., Li, Q., Liu, J., Survey on secure cloud storage. J. Data Acquis. Process. 31:3 (2016), 464–472.
-
(2016)
J. Data Acquis. Process.
, vol.31
, Issue.3
, pp. 464-472
-
-
Xiao, L.1
Li, Q.2
Liu, J.3
-
14
-
-
85026810374
-
Data collection from WSNs to the cloud based on mobile Fog elements
-
Wang, T., Zeng, J., Cai, Y., Tian, H., Chen, Y., Wang, B., et al. Data collection from WSNs to the cloud based on mobile Fog elements. Future Gener. Comput. Syst., 2017, 10.1016/j.future.2017.07.031.
-
(2017)
Future Gener. Comput. Syst.
-
-
Wang, T.1
Zeng, J.2
Cai, Y.3
Tian, H.4
Chen, Y.5
Wang, B.6
-
15
-
-
85027571106
-
LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants
-
Xie, M., Bhanja, U., Shao, J., Zhang, G., Wei, G., LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants. Inform. Sci. 420 (2017), 37–48.
-
(2017)
Inform. Sci.
, vol.420
, pp. 37-48
-
-
Xie, M.1
Bhanja, U.2
Shao, J.3
Zhang, G.4
Wei, G.5
-
16
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini, S., Kavitha, V., A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34:1 (2011), 1–11.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
17
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Takabi, H., Joshi, J.B., Ahn, G.-J., Security and privacy challenges in cloud computing environments. IEEE Secur. Privacy 8:6 (2010), 24–31.
-
(2010)
IEEE Secur. Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.2
Ahn, G.-J.3
-
18
-
-
79951999348
-
Study on cloud computing security
-
Feng, D.-G., Zhang, M., Zhang, Y., Xu, Z., Study on cloud computing security. J. Softw. 22:1 (2011), 71–83.
-
(2011)
J. Softw.
, vol.22
, Issue.1
, pp. 71-83
-
-
Feng, D.-G.1
Zhang, M.2
Zhang, Y.3
Xu, Z.4
-
19
-
-
84857462462
-
Security threats in cloud computing
-
IEEE
-
Shaikh, F.B., Haider, S., Security threats in cloud computing. Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, 2011, IEEE, 214–219.
-
(2011)
Internet Technology and Secured Transactions (ICITST), 2011 International Conference for
, pp. 214-219
-
-
Shaikh, F.B.1
Haider, S.2
-
20
-
-
70349309706
-
Data security in the world of cloud computing
-
Kaufman, L.M., Data security in the world of cloud computing. IEEE Secur. Privacy 7:4 (2009), 61–64.
-
(2009)
IEEE Secur. Privacy
, vol.7
, Issue.4
, pp. 61-64
-
-
Kaufman, L.M.1
-
21
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
IEEE
-
Wang, C., Wang, Q., Ren, K., Lou, W., Privacy-preserving public auditing for data storage security in cloud computing. Infocom, 2010 Proceedings IEEE, 2010, IEEE, 1–9.
-
(2010)
Infocom, 2010 Proceedings IEEE
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
22
-
-
85020435750
-
An efficient public auditing protocol with novel dynamic structure for cloud data
-
Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W., An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inform. Forensics Secur. 12:10 (2017), 2402–2415.
-
(2017)
IEEE Trans. Inform. Forensics Secur.
, vol.12
, Issue.10
, pp. 2402-2415
-
-
Shen, J.1
Shen, J.2
Chen, X.3
Huang, X.4
Susilo, W.5
-
23
-
-
79959557055
-
Addressing cloud computing security issues
-
Zissis, D., Lekkas, D., Addressing cloud computing security issues. Future Gener. Comput. Syst. 28:3 (2012), 583–592.
-
(2012)
Future Gener. Comput. Syst.
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
24
-
-
84986631527
-
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
-
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K., A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inform. Forensics Secur. 11:11 (2016), 2594–2608.
-
(2016)
IEEE Trans. Inform. Forensics Secur.
, vol.11
, Issue.11
, pp. 2594-2608
-
-
Xia, Z.1
Wang, X.2
Zhang, L.3
Qin, Z.4
Sun, X.5
Ren, K.6
-
25
-
-
84914110992
-
Secure user data in cloud computing using encryption algorithms
-
Arora, R., Parashar, A., Transforming, C.C.I., Secure user data in cloud computing using encryption algorithms. Int. J. Eng. Res. Appl. 3:4 (2013), 1922–1926.
-
(2013)
Int. J. Eng. Res. Appl.
, vol.3
, Issue.4
, pp. 1922-1926
-
-
Arora, R.1
Parashar, A.2
Transforming, C.C.I.3
-
26
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
IEEE
-
Yu, S., Wang, C., Ren, K., Lou, W., Achieving secure, scalable, and fine-grained data access control in cloud computing. Infocom, 2010 Proceedings IEEE, 2010, IEEE, 1–9.
-
(2010)
Infocom, 2010 Proceedings IEEE
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
27
-
-
85017189145
-
A secure cloud-assisted urban data sharing framework for ubiquitous-cities
-
Shen, J., Liu, D., Shen, J., Liu, Q., Sun, X., A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive Mobile Comput., 2017, 10.1016/j.pmcj.2017.03.013.
-
(2017)
Pervasive Mobile Comput.
-
-
Shen, J.1
Liu, D.2
Shen, J.3
Liu, Q.4
Sun, X.5
-
28
-
-
77957700442
-
Establishing trust in cloud computing
-
Khan, K.M., Malluhi, Q., Establishing trust in cloud computing. IT Professional 12:5 (2010), 20–27.
-
(2010)
IT Professional
, vol.12
, Issue.5
, pp. 20-27
-
-
Khan, K.M.1
Malluhi, Q.2
-
29
-
-
84991088919
-
Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
-
Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K., Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inform. Forensics Secur. 11:12 (2016), 2706–2716.
-
(2016)
IEEE Trans. Inform. Forensics Secur.
, vol.11
, Issue.12
, pp. 2706-2716
-
-
Fu, Z.1
Wu, X.2
Guan, C.3
Sun, X.4
Ren, K.5
-
30
-
-
84982135416
-
Enabling personalized search over encrypted outsourced data with efficiency improvement
-
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F., Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27:9 (2016), 2546–2559.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.9
, pp. 2546-2559
-
-
Fu, Z.1
Ren, K.2
Shu, J.3
Sun, X.4
Huang, F.5
-
31
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Xia, Z., Wang, X., Sun, X., Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27:2 (2016), 340–352.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
32
-
-
85077359111
-
Enabling semantic search based on conceptual graphs over encrypted outsourced data
-
Fu, Z., Huang, F., Sun, X., Vasilakos, A., Yang, C.-N., Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput., 2016, 10.1109/TSC.2016.2622697.
-
(2016)
IEEE Trans. Serv. Comput.
-
-
Fu, Z.1
Huang, F.2
Sun, X.3
Vasilakos, A.4
Yang, C.-N.5
-
33
-
-
84866627419
-
Fog computing and its role in the internet of things
-
ACM
-
Bonomi, F., Milito, R., Zhu, J., Addepalli, S., Fog computing and its role in the internet of things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, 2012, ACM, 13–16.
-
(2012)
Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
34
-
-
84940996194
-
Fog computing: focusing on mobile users at the edge
-
arXiv:1502.01815 [cs.NI]
-
Luan, T.H., Gao, L., Li, Z., Xiang, Y., Wei, G., Sun, L., Fog computing: focusing on mobile users at the edge. Comput. Sci., 2015 arXiv:1502.01815 [cs.NI].
-
(2015)
Comput. Sci.
-
-
Luan, T.H.1
Gao, L.2
Li, Z.3
Xiang, Y.4
Wei, G.5
Sun, L.6
-
36
-
-
84964284114
-
Fog computing in healthcare internet of things: A case study on ecg feature extraction
-
IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing
-
T.N. Gia, M. Jiang, A.M. Rahmani, T. Westerlund, P. Liljeberg, H. Tenhunen, Fog computing in healthcare internet of things: A case study on ecg feature extraction, in: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015, pp. 356–363.
-
(2015)
, pp. 356-363
-
-
Gia, T.N.1
Jiang, M.2
Rahmani, A.M.3
Westerlund, T.4
Liljeberg, P.5
Tenhunen, H.6
-
37
-
-
85043715848
-
-
IEEE
-
Zhu, J., Chan, D., Natarajan, P., Hu, H., Improving Web sites Performance Using Edge Servers in Fog Computing Architecture, 2015, IEEE, 320–323.
-
(2015)
Improving Web sites Performance Using Edge Servers in Fog Computing Architecture
, pp. 320-323
-
-
Zhu, J.1
Chan, D.2
Natarajan, P.3
Hu, H.4
-
38
-
-
84922575268
-
Fog computing and smart gateway based communication for cloud of things
-
International Conference on Future Internet of Things and Cloud
-
M. Aazam, E.N. Huh, Fog computing and smart gateway based communication for cloud of things, in: International Conference on Future Internet of Things and Cloud, 2014, pp. 464–470.
-
(2014)
, pp. 464-470
-
-
Aazam, M.1
Huh, E.N.2
-
39
-
-
84947260890
-
Maximizing real-time streaming services based on a multi-servers networking framework
-
Wang, T., Cai, Y., Jia, W., Wen, S., Wang, G., Tian, H., Chen, Y., Zhong, B., Maximizing real-time streaming services based on a multi-servers networking framework. Comput. Netw. 93:P1 (2015), 199–212.
-
(2015)
Comput. Netw.
, vol.93
, Issue.P1
, pp. 199-212
-
-
Wang, T.1
Cai, Y.2
Jia, W.3
Wen, S.4
Wang, G.5
Tian, H.6
Chen, Y.7
Zhong, B.8
-
40
-
-
84982279617
-
An end-to-end security approach for digital document management
-
Munoz-Hernandez, M.D., Morales-Sandoval, M., Garcia-Hernandez, J.J., An end-to-end security approach for digital document management. Comput. J. 59:7 (2016), 1076–1090.
-
(2016)
Comput. J.
, vol.59
, Issue.7
, pp. 1076-1090
-
-
Munoz-Hernandez, M.D.1
Morales-Sandoval, M.2
Garcia-Hernandez, J.J.3
-
41
-
-
24944591357
-
How to break MD5 and other hash functions
-
Wang, X., Yu, H., How to break MD5 and other hash functions. Eurocrypt 3494 (2005), 19–35.
-
(2005)
Eurocrypt
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
|