default search action
ISCTCS 2012: Beijing, China
- Yuyu Yuan, Xu Wu, Yueming Lu:
Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers. Communications in Computer and Information Science 320, Springer 2013, ISBN 978-3-642-35794-7 - Mitra Nami, Witold Suryn:
Software Trustworthiness: Past, Present and Future. 1-12 - Yuyu Yuan, Qiang Han, Sun Qi:
A New Measurement Method for Software Trustworthiness Based on Rough Sets. 13-19 - Yuyu Yuan, Yangyang Zhang, Jing Liu:
Service Behavior Trustworthiness Management. 20-25 - Yao Pang, Xiaoxiao Zhang, Luwei Sun, Weimin Ding:
Research on Identifying Method of Covert Channels in Database System. 26-33 - Mitra Nami, Witold Suryn:
Software Testing is Necessary But Not Sufficient for Software Trustworthiness. 34-44 - Jiaping Zuo, Pei Ren, Hao Kong:
A Measurement Model for Trustworthiness of Information System Based on Third-Party Testing Data. 45-51 - Nafei Zhu, Jiaping Zuo, Yue Zhou, Wei Wang:
Overview of Monitor Selection in Computer Networks. 52-59 - Kazuhiro Esaki:
Verification of Requirement Analysis Method for System Based on ISO/IEC 9126 Six Quality Characteristics. 60-68 - Xiang Yao, Wenbin Yao:
A Trustworthy Storage Framework on the Cloud. 69-77 - Zigang Cao, Shoufeng Cao, Gang Xiong, Li Guo:
Progress in Study of Encrypted Traffic Classification. 78-86 - Jørgen Bøegh:
Trustworthiness: From a Social Phenomenon to Internet Technology. 87-93 - Kazuhiro Esaki, Motoei Azuma, Toshihiro Komiyama:
Introduction of Quality Requirement and Evaluation Based on ISO/IEC SQuaRE Series of Standard. 94-101 - De-yu Yuan, Tong Liu, Geng-yu Wei, Zhi-zhao Wang:
A Survey on the Security of Multihop Ad Hoc Network. 102-108 - Bing Rao, Zhigang Zhou, Hongli Zhang, Shuofei Tang, Renfu Yao:
Outsourcing Cloud Data Privacy-Preserving Based on Over-Encryption. 109-116 - Dong Wang, Hui He, Jiantao Shi:
The Measurement and Analysis of KAD Network. 117-123 - Meng Zhang, Hongli Zhang, Bo Zhang, Gang Lu:
Encrypted Traffic Classification Based on an Improved Clustering Algorithm. 124-131 - Gang Xiong, Wenting Huang, Yong Zhao, Ming Song, Zhenzhen Li, Li Guo:
Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior Association. 132-139 - Zhao Chen, Wenbin Yao, Cong Wang:
Security and Trust Model for Data Disaster-Recovery Service on the Cloud. 140-147 - Xiao Wang, Jinqiao Shi, Li Guo:
Towards Analyzing Traceability of Data Leakage by Malicious Insiders. 148-155 - Liang Ma, Yueming Lu, Fangwei Zhang, Songlin Sun:
Dynamic Task Scheduling in Cloud Computing Based on Greedy Strategy. 156-162 - Haiqi Huang, Yueming Lu, Fangwei Zhang, Songlin Sun:
A Multi-modal Clustering Method for Web Videos. 163-169 - Fei Huang, Xiaojun Jing, Songlin Sun, Yueming Lu:
Incorporate Spatial Information into pLSA for Scene Classification. 170-177 - Mingtao Lei, Wenbin Yao, Cong Wang:
A Trust-Based Data Backup Method on the Cloud. 178-185 - Chenggang Shao, Xiaojun Jing, Songlin Sun, Yueming Lu:
Active RFID-Based Indoor Localization Algorithm Using Virtual Reference through Bivariate Newton Interpolation. 186-193 - Chunwen Li, Xu Wu, Chuanyi Liu, Xiaqing Xie:
An Implementation of Trusted Remote Attestation Oriented the IaaSCloud. 194-202 - Jing Fu, Xiaojun Jing, Songlin Sun, Yueming Lu, Ying Wang:
C-SURF: Colored Speeded Up Robust Features. 203-210 - Jun Li, Zuo Xin-qiang, Zhou Meng-qi, Fan Gong-yuan, Li Lian-cun:
Mining Explainable User Interests from Scalable User Behavior Data. 211-218 - Xu Wu, Xiaqing Xie, Chuanyi Liu, Chunwen Li:
An Improved Design of the Trustworthiness Authentication Mechanism of IaaS. 219-226 - Jincui Yang, Bin-Xing Fang, Yuyu Yuan, Meng-Xiao Zhai:
Research on Simulation and Real-Time Evaluation Method of IoT-Oriented Complex System. 227-235 - Tianle Zhang, Yuyu Yuan, Jørgen Bøegh, Xu Wu:
A New Manipulation Based Mobility Model for Vehicular Delay Tolerant Networks. 236-241 - Hongqi Wang, Zongwei Luo, Tianle Zhang, Yuyu Yuan, Xu Wu:
A Pervasive Technology Approach to Social Trustworthiness. 242-249 - Chuanyi Liu, Xiaojian Liu, Lei Wan:
Policy-Based De-duplication in Secure Cloud Storage. 250-262 - Fei Wang, Yueming Lu, Fangwei Zhang, Songlin Sun:
A New Method Based on Fuzzy C-Means Algorithm for Search Results Clustering. 263-270 - Yanting Niu, Yueming Lu, Fangwei Zhang, Songlin Sun:
A Distance Adaptive Embedding Method in Dimension Reduction. 271-278 - Xiaolong Zhao, Tiejun Lv, Yanhui Ma, Yueming Lu:
Joint Cognitive Access and Power Control in Two-Tie Femtocell Networks. 279-286 - Chengcheng Li, Yuanfang Xu:
Based on Support Vector and Word Features New Word Discovery Research. 287-294 - Haining Yu, Hongli Zhang, Xingzhan Yu:
A Flexible Framework for Representations of Entities in the Internet of Things. 295-302 - Bingying Xu, Zheng Liang, Yan Jia, Bin Zhou:
Community Detection Based on Robust Label Propagation Algorithm. 303-310 - Liu Xuehai, Tang Jin:
Clock Synchronization Algorithm for Distributed Video Surveillance Based on PTP. 311-316 - Wei Ding, Tiejun Lv, Yueming Lu:
A Low-Complexity Vector Perturbation Precoding Approach Based on Reactive Tabu Search for Large Multiuser MIMO Systems. 317-324 - Hongli Zhang, Panpan Li, Zhigang Zhou, Xiangzhan Yu:
A PSO-Based Hierarchical Resource Scheduling Strategy on Cloud Computing. 325-332 - Yinjie Su, Jiahui Liu, Dong Li:
Hiding Signatures in Variable Names. 333-340 - Zheng Liang, Bingying Xu, Jie Zhao, Yan Jia, Bin Zhou:
Chinese New Words Detection Using Mutual Information. 341-348 - Yujian Fan, Hongli Zhang, Jiahui Liu, Dongliang Xu:
An Efficient Parallel String Matching Algorithm Based on DFA. 349-356 - Shuo Zheng, Siyang Wang, Cong Wang:
A Ciphertext Data Retrieval Method Based on Cloud Storage. 357-364 - Fei Liu, Yan Jia, Weihong Han:
A Multi-phase k-anonymity Algorithm Based on Clustering Techniques. 365-372 - Chao Xin, Hui-jun Han, Xiuqin Lin, Gengyu Wei:
A P2P Reputation Model Based on P2P File-Sharing Behavioral Characteristics. 373-379 - Fanwen Xu, Qingfeng Tan, Jinqiao Shi, Li Guo:
Unobservable Rendezvous Negotiation in P2P Networks. 380-387 - Yiguo Pu, Jinqiao Shi, Li Guo:
A Hierarchical Method for Clustering Binary Text Image. 388-396 - Jinxiu Yu, Yueming Lu, Songlin Sun, Fangwei Zhang:
Search Results Evaluation Based on User Behavior. 397-403 - Peipei Fu, Li Guo, Gang Xiong, Jiao Meng:
Classification Research on SSL Encrypted Application. 404-411 - Shuai Wang, Xiang Cui, Peng Liao, Dan Li:
S-URL Flux: A Novel C&C Protocol for Mobile Botnets. 412-419 - Peipeng Liu, Jinqiao Shi, Lihong Wang, Li Guo:
An Efficient Ellipse-Shaped Blobs Detection Algorithm for Breaking Facebook CAPTCHA. 420-428 - Yao Yao, Longtao He, Gang Xiong:
Security and Cost Analyses of DNSSEC Protocol. 429-435 - Peidai Xie, Xicheng Lu, Yongjun Wang, Jinshu Su, Meijian Li:
An Automatic Approach to Detect Anti-debugging in Malware Analysis. 436-442 - Yi Pang, Shuyuan Jin, Shicong Li, Jilei Li, Hao Ren:
OpenVPN Traffic Identification Using Traffic Fingerprints and Statistical Characteristics. 443-449 - Xiaojun Chen, Jinqiao Shi, Yiguo Pu, Haoliang Zhang:
An Intent-Driven Masquerader Detection Framework Based on Data Fusion. 450-457 - Yuchen Xing, Hanfei Wang, Jianhua Zhao:
An Integration of Several Different Data Flow Analysis Techniques. 458-465 - Yuankui Li, Linzhang Wang:
Specifying and Detecting Behavioral Changes in Source Code Using Abstract Syntax Tree Differencing. 466-473 - Qingqing Sun, Xiaopu Huang, Jiangwei Li, Tian Zhang:
Timing Aspects Construction Using UML-MARTE Profile. 474-481 - Xiaoyu Zhou, Jianhua Zhao:
An Overtime-Detection Model-Checking Technique for Interrupt Processing Systems. 482-489 - Xiaopu Huang, Qingqing Sun, Jiangwei Li, Tian Zhang:
MDE-Based Verification of SysML State Machine Diagram by UPPAAL. 490-497 - Ying He, Yongjing Tao, Tian Zhang:
CppIns: A Source Query Language for Instrumentation. 498-505 - Xuelin Zhang, Huajie Chen, Tian Zhang:
An UML Model Query Method Based on Structure Pattern Matching. 506-513 - Yan Ding, Hongyi Fu, Lifeng Wei, Lianyue He, Huadong Dai, Qingbo Wu:
A Lightweight Type Enforcement Access Control Approach with Role Based Authorization. 514-521 - Jiangwei Li, Jizhou Zhao, Qingqing Sun, Xiaopu Huang, Yan Zhang, Tian Zhang:
Composition of AADL Components by Transformation to Interface Automata. 522-529 - Kun Wang, Ying Sha, Jianlong Tan, Li Guo, Yang Li:
Finding δ-Closure Property of BitTorrent System and Applications Based on This Property. 530-538 - Jizhou Zhao, Jiangwei Li, Yan Zhang, Tian Zhang:
A Tool to Construct One Comprehensive Legal Environment for Behavioral Incompatible Components. 539-546 - Yang Li, Xiaoyan Wang, Ying Sha, Jianlong Tan:
Research of Security Relationship Based on Social Networks. 547-554 - Chunlu Wang, Yu Bao, Xuesen Liang, Tianle Zhang:
Vulnerability Evaluating Based on Attack Graph. 555-563 - Qingyun Liu, Wenzhong Feng, Qiong Dai:
A Dynamic Strategy to Cache Out-of-Sequence Packet in DPI System. 564-571 - Shuai Niu, Yanbing Liu, Xinbo Song:
Speeding Up Double-Array Trie Construction for String Matching. 572-579 - Yongzheng Zhang, Xiaochun Yun:
Modeling of Hierarchical Index System for Network Operation Security. 580-590 - Qing Xu, Yu Pei, Linzhang Wang:
An Evaluation Framework of Coverage-Based Fault Localization for Object-Oriented Programs. 591-597 - Xiaoyan Wang, Kai Xu, Ying Sha, Jianlong Tan, Li Guo:
Research of New Words Identification in Social Network for Monitoring Public Opinion. 598-603 - Jinyu Wu, Lihua Yin, Binxing Fang:
A Novel Dynamic Self-adaptive Framework for Network Security Evaluation. 604-612 - Xiaoyan Cui, Xiaoshuang Chen, Haitao Zhang, Shizhuo Zheng:
Wireless Sensor Network MAC Protocol Used in the City Fire. 613-620 - Xiaoyan Cui, Xiaoshuang Chen, Wei Shi, Yi Zhang:
The Application of Robot Localization and Navigation Based on WSN in the Disaster Relief. 621-628 - Fuhui Wu, Qingbo Wu, Yusong Tan:
Comparison and Performance Analysis of Join Approach in MapReduce. 629-636 - Zhilei Wang, Lidong Zhai, Yongqiang Ma, Yue Li:
Analysis of Public Sentiment Based on SMS Content. 637-643 - Yue Li, Lidong Zhai, Zhilei Wang, Yunlong Ren:
Control Method of Twitter- and SMS-Based Mobile Botnet. 644-650 - Yuan Gao, Yaoxue Zhang, Yuezhi Zhou:
A Cache Management Strategy for Transparent Computing Storage System. 651-658 - Yaxing Zhang, Shuyuan Jin, Xiang Cui, Xi Yin, Yi Pang:
Network Security Situation Prediction Based on BP and RBF Neural Network. 659-665 - Fangjiao Zhang, Wei Guo, Jincui Yang, Fangfang Yuan, Lidong Zhai:
Research on Redundant Channel Model Based on Spatial Correlation in IOT. 666-672 - Songchang Jin, Shuqiang Yang, Xiang Zhu, Hong Yin:
Design of a Trusted File System Based on Hadoop. 673-680 - Wentao Jia, Chunyuan Zhang, Jian Fu, Rui Li:
Architecting Dependable Many-Core Processors Using Core-Level Dynamic Redundancy. 681-688 - Dapeng Xiong, Zhang Yan, Aiping Li:
Study on Transformed Keywords Identification in Spam Filtering. 689-697 - Mingfei Wu, Yi Han, Bin Zhou, Aiping Li:
Preliminary Study of Enhanced Collaborative Information Extracting and Sharing System. 698-705 - Taiping Guo, Zhongzhi Luan:
A Compatible and Graphical Modeling Approach for Earth System Model. 706-713 - Liu Yinglian, Jørgen Bøegh, Sun Qi:
Who Can Haul the ANDON-CORD in the Software Development Process. 714-720 - Weihong Han, Qingguang Wang, Yan Jia:
Research and Implement of Security Situation Awareness System YH-SSAS. 721-729 - Junchao Wu, Panpan Li, Hongli Zhang, Binsheng Chu:
A Reliable Query Scheme for Outsourced Data in Cloud. 730-736
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.