Title
|
Author/s
|
|
Anonymizing k-NN Classification on MapReduce |
Bazai, Sibghat Ullah (INMS, Massey University, NZ); Jang-Jaccard, Julian (INMS, Massey University, NZ); Wang, Ruili (INMS, Massey University, NZ) |
|
Homomorphic Evaluation of Database Queries |
Usefi, Hamid (Memorial University of Newfoundland); Palamakumbura, Sudharaka (Memorial University of Newfoundland) |
|
A Variant of BLS Signature With Tight Reduction |
Ng, Tiong-Sik (Multimedia University); Tan, Syh-Yuan (Multimedia University); Chin, Ji-Jian (Multimedia University) |
|
Persistent vs Service IDs in Android: Session Fingerprinting from Apps |
Alepis, Efthimios (Department of Informatics, University of Piraeus); Patsakis, Constantinos (Department of Informatics, University of Piraeus) |
|
Cryptanalysis of Salsa and ChaCha: Revisited |
Deepu, Kkc (National Institute of Technology); Singh, Kunwar (National Institute of Technology, India) |
|
Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Discovery of New Hydrocarbon Reservoirs at A Higher Speed |
Tari, Zahir; Goscinski, Andrze (Deakin University); Izzatdin, Aziz (Universiti Teknologi Petronas) |
|
Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning |
haider, waqas (UNSW ADFA); Hu, Jiankun (UNSW ADFA); Moustafa, Nour (UNSW ADFA) |
|
AN APPROACH FOR HOST-BASED INTRUSION DETECTION SYSTEM DESIGN USING CONVOLUTIONAL NEURAL NETWORK |
Tran, Nam (University of New South Wales Canberra at the Australian Defence Force Academy); Sarker, Ruhul (University of New South Wales Canberra at the Australian Defence Force Academy); Hu, Jiankun (University of New South Wales Canberra at the Australian Defence Force Academy) |
|
Cooperative Information Security / Cybersecurity Curriculum Development |
Bouras, Abdelaziz; Gasmi, Houssem (Qatar University and Université Lumière Lyon 2); Ghemri, Fadi (Qatar University) |
|
A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources |
Yeun, Chan Yeob (Khalifa University); Shemaili, Mouza Ahmed Bani (HCT); Zemerly, Mohamed Jamal (Khalifa University); Mubarak, Khalid (HCT); Yeun, Hyun Ku (HCT); Chang, Yoon Seok (Korea Aerospace University); Zafar, Basim (Umm Al-Qura University); Salih, Yasir (Umm Al-Qura University); Simsim, Mohammed (Ministry of Hajj); Lee, Gaemyoung (Jeju National University) |
|
A Robust Contactless Fingerprint Enhancement Algorithm |
Yin, Xuefei (UNSW); Zhu, Yanming (UNSW); Hu, Jiankun (UNSW) |
|
Robust Fingerprint Matching Based on Convolutional Neural Networks |
Zhu, Yanming (UNSW); Yin, Xuefei (UNSW); Hu, Jiankun (UNSW) |
|
A Cache-aware Congestion Control for Reliable Transport in Wireless Sensor Networks |
Alipio, Melchizedek (University of the Philippines Diliman); Tiglao, Nestor Michael (University of the Philippines Diliman) |
|
Performance Assessment of Cloud Migrations from Network and Application Point of View |
Iffländer, Lukas (Chair of Software Engineering, University of Wuerzburg); Wamser, Florian (Chair of Communication Networks, University of Wuerzburg); Metter, Christopher (Chair of Communication Networks, University of Wuerzburg); Tran-Gia, Phuoc (Chair of Communication Networks, University of Wuerzburg); Kounev, Samuel (Chair of Software Engineering, University of Wuerzburg) |
|
Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework |
c p, Sona (Rajagiri School of Engineering and Technology); Mulerikkal, JaisonPaul (Rajagiri School of Engineering and Technology) |
|
Estimating public opinion in social media content using aspect-based opinion mining |
TRAN, YenHong (People's Security Academy); Tran, QuangNhat (University of New South Wales at ADFA, Canberra) |
|
Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications |
Quinton, Benjamin (UNSW); Aboutorab, Neda (UNSW) |
|
The Public Verifiability of Public Key Encryption with Keyword Search |
Zhu, Binrui (Shandong University); Sun, Jiameng (Shandong University); Qin, Jing (Shandong University); Ma, Jixin (University of Greenwich) |
|
A Cancellable Ranking based Hashing Method for Fingerprint Template Protection |
Jin, zhe (Monash University Malaysia); Lai, Yen-Lung (Monash University Malaysia); Hwang, Jung Yeon (Electronics and Telecommunications Research Institute); Kim, Soohyung (Electronics and Telecommunications Research Institute); Cho, Sangrae (Electronics and Telecommunications Research Institute); Teoh, Andrew Beng Jin (Yonsei University) |
|
An Energy Saving Mechanism based on Vacation Queuing Theory in Data Center Networks |
Baccour, Emna (College of Engineering, Qatar University, Qatar); Gouissem, Ala (College of Engineering, Qatar University, Qatar); Foufou, Sebtin(LE2i Lab ,University of Burgundy, Dijon, France, Computer Science, New York University, Abu Dhabi, UAE); Hamila, Ridha (College of Engineering, Qatar University, Qatar); Tari, Zahir (School of Science, RMIT University, Melbourne, Australia); Y. Zomaya, Albert (School of Information Technologies, University of Sydney, Sydney, Australia) |
|
CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains |
Li, Yandong (Beijing Institute of Technology, Beijing, China); Zhu, Liehuang (Beijing Institute of Technology, Beijing, China); Shen, Meng (Beijing Institute of Technology, Beijing, China); Gao, Feng (Beijing Institute of Technology, Beijing, China); Zheng, Baokun (Beijing Institute of Technology, Beijing, China); Du, Xiaojiang (Temple University, Philadelphia, USA) |
|
A novel key agreement protocol based on RET gadget |
fusheng, wu; Zhang, Huanguo |
|
Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques |
Koroniotis, Nickolaos (University of New South Wales - Canberra); Moustafa, Nour (University of New South Wales - Canberra); Sitnikova, Elena (University of New South Wales - Canberra); Slay, Jill (University of New South Wales - Canberra) |
|
Malicious Bitcoin Transaction Tracing Using Incidence Relation Clustering |
Zheng, Baokun (Beijing Institute of Technology); Zhu, Liehuang (Beijing Institute of Technology); Shen, Meng (Beijing Institute of Technology); Du, Xiaojiang (Temple University); Yang, Jing (Beijing Institute of Technology); Gao, Feng (Beijing Institute of Technology); Li, Yandong (Beijing Institute of Technology); Zhang, Chuan (Beijing Institute of Technology) |
|
Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling |
Zhou, Zhaohua (PetroChina Research Institute of Petroleum Exploration & Development); Shi, Shi (PetroChina Research Institute of Petroleum Exploration & Development); Ma, Shunan (Institute of Information Engineering, Chinese Academy of Science); Fu, Jing (PetroChina Research Institute of Petroleum Exploration & Development) |
|
Probability Risk Identification Based Intrusion Detection System for SCADA Systems |
Marsden, Thomas (School of Engineering and Information Technology, UNSW Canberra); Moustafa, Nour (School of Engineering and Information Technology, UNSW Canberra); Sitnikova, Elena (Australian Centre for Cyber Security, UNSW Canberra); Creech, Gideon (Adjunct Researcher to Australian Centre for Cyber Security, UNSW Canberra) |
|
Application of 3D Delaunay Triangulation in Fingerprint Authentication System |
Yang, Wencheng (Security Research Institute, School of Science, Edith Cowan University Perth); Zheng, Guanglou (Security Research Institute, School of Science, Edith Cowan University Perth); Ibrahim, Ahmed (Security Research Institute, School of Science, Edith Cowan University Perth); Chaudhry, Junaid (Security Research Institute, School of Science, Edith Cowan University Perth); Wang, Song (School of Engineering and Mathematical Sciences, La Trobe University); Hu, Jiankun (Security Research Institute, School of Science, Edith School of Engineering and Information Technology, University of New South Wales at Canberra); Valli, Craig (Security Research Institute, School of Science, Edith Cowan University Perth) |
|
A Cloud Service Enhanced Method Supporting Context-aware Applications |
Liu, Zifan (Nanjing University); Cai, Qing (Nanjing University of Information Science and Technology); Xu, Xiaolong (Nanjing University of Information Science and Technology); Dou, Wanchun (Nanjing University); Yu, Shui (Deakin University, Melbourne) |
|
Quantum authentication scheme based on fingerprint-encoded graph states |
Guo, Ying (Central South University, China); Li, Fei (Central South University, China) |
|
A Personalized Multi-Keyword Ranked Search Method over Encrypted Cloud Data |
Tian, Xue (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, China); Shen, Peisong (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, China); Yang, Tengfei (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, China); Chen, Ch (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, China); Hu, Jiankun (UNSW, Canberra, Australia) |
|