This event is endorsed
and organized by

9th EAI International Conference on Mobile Networks and Management

December 13–15, 2017 | Melbourne, Australia

Title

Author/s

Anonymizing k-NN Classification on MapReduce Bazai, Sibghat Ullah (INMS, Massey University, NZ); Jang-Jaccard, Julian (INMS, Massey University, NZ); Wang, Ruili (INMS, Massey University, NZ)
Homomorphic Evaluation of Database Queries Usefi, Hamid (Memorial University of Newfoundland); Palamakumbura, Sudharaka (Memorial University of Newfoundland)
A Variant of BLS Signature With Tight Reduction Ng, Tiong-Sik (Multimedia University); Tan, Syh-Yuan (Multimedia University); Chin, Ji-Jian (Multimedia University)
Persistent vs Service IDs in Android: Session Fingerprinting from Apps Alepis, Efthimios (Department of Informatics, University of Piraeus); Patsakis, Constantinos (Department of Informatics, University of Piraeus)
Cryptanalysis of Salsa and ChaCha: Revisited Deepu, Kkc (National Institute of Technology); Singh, Kunwar (National Institute of Technology, India)
Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Discovery of New Hydrocarbon Reservoirs at A Higher Speed Tari, Zahir; Goscinski, Andrze (Deakin University); Izzatdin, Aziz (Universiti Teknologi Petronas)
Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifi ers and Machine Learning haider, waqas (UNSW ADFA); Hu, Jiankun (UNSW ADFA); Moustafa, Nour (UNSW ADFA)
AN APPROACH FOR HOST-BASED INTRUSION DETECTION SYSTEM DESIGN USING CONVOLUTIONAL NEURAL NETWORK Tran, Nam (University of New South Wales Canberra at the Australian Defence Force Academy); Sarker, Ruhul (University of New South Wales Canberra at the Australian Defence Force Academy); Hu, Jiankun (University of New South Wales Canberra at the Australian Defence Force Academy)
Cooperative Information Security / Cybersecurity Curriculum Development  Bouras, Abdelaziz; Gasmi, Houssem (Qatar University and Université Lumière Lyon 2); Ghemri, Fadi (Qatar University)
A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources Yeun, Chan Yeob (Khalifa University); Shemaili, Mouza Ahmed Bani (HCT); Zemerly, Mohamed Jamal (Khalifa University); Mubarak, Khalid (HCT); Yeun, Hyun Ku (HCT); Chang, Yoon Seok (Korea Aerospace University); Zafar, Basim (Umm Al-Qura University); Salih, Yasir (Umm Al-Qura University); Simsim, Mohammed (Ministry of Hajj); Lee, Gaemyoung (Jeju National University)
A Robust Contactless Fingerprint Enhancement Algorithm Yin, Xuefei (UNSW); Zhu, Yanming (UNSW); Hu, Jiankun (UNSW)
Robust Fingerprint Matching Based on Convolutional Neural Networks Zhu, Yanming (UNSW); Yin, Xuefei (UNSW); Hu, Jiankun (UNSW)
A Cache-aware Congestion Control for Reliable Transport in Wireless Sensor Networks Alipio, Melchizedek (University of the Philippines Diliman); Tiglao, Nestor Michael (University of the Philippines Diliman)
Performance Assessment of Cloud Migrations from Network and Application Point of View Iffländer, Lukas (Chair of Software Engineering, University of Wuerzburg); Wamser, Florian (Chair of Communication Networks, University of Wuerzburg); Metter, Christopher (Chair of Communication Networks, University of Wuerzburg); Tran-Gia, Phuoc (Chair of Communication Networks, University of Wuerzburg); Kounev, Samuel (Chair of Software Engineering, University of Wuerzburg)
Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework c p, Sona (Rajagiri School of Engineering and Technology); Mulerikkal, JaisonPaul (Rajagiri School of Engineering and Technology)
Estimating public opinion in social media content using aspect-based opinion mining TRAN, YenHong (People's Security Academy); Tran, QuangNhat (University of New South Wales at ADFA, Canberra)
Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications Quinton, Benjamin (UNSW); Aboutorab, Neda (UNSW)
The Public Verifiability of Public Key Encryption with Keyword Search Zhu, Binrui (Shandong University); Sun, Jiameng (Shandong University); Qin, Jing (Shandong University); Ma, Jixin (University of Greenwich)
A Cancellable Ranking based Hashing Method for Fingerprint Template Protection Jin, zhe (Monash University Malaysia); Lai, Yen-Lung (Monash University Malaysia); Hwang, Jung Yeon (Electronics and Telecommunications Research Institute); Kim, Soohyung (Electronics and Telecommunications Research Institute); Cho, Sangrae (Electronics and Telecommunications Research Institute); Teoh, Andrew Beng Jin (Yonsei University)
An Energy Saving Mechanism based on Vacation Queuing Theory in Data Center Networks Baccour, Emna (College of Engineering, Qatar University, Qatar); Gouissem, Ala (College of Engineering, Qatar University, Qatar); Foufou, Sebtin(LE2i Lab ,University of Burgundy, Dijon, France,  Computer Science, New York University, Abu Dhabi, UAE); Hamila, Ridha (College of Engineering, Qatar University, Qatar); Tari, Zahir (School of Science, RMIT University, Melbourne, Australia); Y. Zomaya, Albert (School of Information Technologies, University of Sydney, Sydney, Australia)
CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains Li, Yandong (Beijing Institute of Technology, Beijing, China); Zhu, Liehuang (Beijing Institute of Technology, Beijing, China); Shen, Meng (Beijing Institute of Technology, Beijing, China); Gao, Feng (Beijing Institute of Technology, Beijing, China); Zheng, Baokun (Beijing Institute of Technology, Beijing, China); Du, Xiaojiang (Temple University, Philadelphia, USA)
A novel key agreement protocol based on RET gadget fusheng, wu; Zhang, Huanguo 
Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques  Koroniotis, Nickolaos (University of New South Wales - Canberra); Moustafa, Nour (University of New South Wales - Canberra); Sitnikova, Elena (University of New South Wales - Canberra); Slay, Jill (University of New South Wales - Canberra)
Malicious Bitcoin Transaction Tracing  Using Incidence Relation Clustering Zheng, Baokun (Beijing Institute of Technology); Zhu, Liehuang (Beijing Institute of Technology); Shen, Meng (Beijing Institute of Technology); Du, Xiaojiang (Temple University); Yang, Jing (Beijing Institute of Technology); Gao, Feng (Beijing Institute of Technology); Li, Yandong (Beijing Institute of Technology); Zhang, Chuan (Beijing Institute of Technology)
Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling Zhou, Zhaohua (PetroChina Research Institute of Petroleum Exploration & Development); Shi, Shi (PetroChina Research Institute of Petroleum Exploration & Development); Ma, Shunan (Institute of Information Engineering, Chinese Academy of Science); Fu, Jing (PetroChina Research Institute of Petroleum Exploration & Development)
Probability Risk Identification Based Intrusion Detection System for SCADA Systems Marsden, Thomas (School of Engineering and Information Technology, UNSW Canberra); Moustafa, Nour (School of Engineering and Information Technology, UNSW Canberra); Sitnikova, Elena (Australian Centre for Cyber Security, UNSW Canberra); Creech, Gideon (Adjunct Researcher to Australian Centre for Cyber Security, UNSW Canberra)
Application of 3D Delaunay Triangulation in Fingerprint Authentication System Yang, Wencheng (Security Research Institute, School of Science, Edith Cowan University Perth); Zheng, Guanglou (Security Research Institute, School of Science, Edith Cowan University Perth); Ibrahim, Ahmed (Security Research Institute, School of Science, Edith Cowan University Perth); Chaudhry, Junaid (Security Research Institute, School of Science, Edith Cowan University Perth); Wang, Song (School of Engineering and Mathematical Sciences, La Trobe University); Hu, Jiankun (Security Research Institute, School of Science, Edith School of Engineering and Information Technology, University of New South Wales at Canberra); Valli, Craig (Security Research Institute, School of Science, Edith Cowan University Perth)
A Cloud Service Enhanced Method Supporting Context-aware Applications Liu, Zifan (Nanjing University); Cai, Qing (Nanjing University of Information Science and Technology); Xu, Xiaolong (Nanjing University of Information Science and Technology); Dou, Wanchun (Nanjing University); Yu, Shui (Deakin University, Melbourne)
Quantum authentication scheme based on fingerprint-encoded graph states Guo, Ying (Central South University, China); Li, Fei (Central South University, China)
A Personalized Multi-Keyword Ranked Search Method over Encrypted Cloud Data Tian, Xue (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, China); Shen, Peisong (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, China); Yang, Tengfei (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, China); Chen, Ch (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, China); Hu, Jiankun (UNSW, Canberra, Australia)