ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
Latest Publications
TOTAL DOCUMENTS
101
(FIVE YEARS 0)
H-INDEX
10
(FIVE YEARS 0)
Published By IEEE
9781467393003
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
An Uneven Distributed System for Dynamic Taint Analysis Framework
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
◽
10.1109/cscloud.2015.20
◽
2015
◽
Author(s):
Xuefei Wang
◽
Hengtai Ma
◽
Ke Yang
◽
Hongliang Liang
Keyword(s):
Distributed System
◽
Analysis Framework
◽
Taint Analysis
Download Full-text
Website Forgery: Understanding Phishing Attacks and Nontechnical Countermeasures
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
◽
10.1109/cscloud.2015.77
◽
2015
◽
Cited By ~ 1
Author(s):
Ibrahim Waziri
Keyword(s):
Phishing Attacks
Download Full-text
Access Control for Multi-tenancy in Cloud-Based Health Information Systems
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
◽
10.1109/cscloud.2015.95
◽
2015
◽
Cited By ~ 4
Author(s):
Mohd Anwar
◽
Ashiq Imran
Keyword(s):
Information Systems
◽
Access Control
◽
Health Information
◽
Health Information Systems
Download Full-text
Adaptive Resource Allocation Optimization in Heterogeneous Mobile Cloud Systems
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
◽
10.1109/cscloud.2015.60
◽
2015
◽
Cited By ~ 18
Author(s):
Longbin Chen
◽
Yucong Duan
◽
Meikang Qiu
◽
Jian Xiong
◽
Keke Gai
Keyword(s):
Resource Allocation
◽
Mobile Cloud
◽
Adaptive Resource Allocation
◽
Cloud Systems
◽
Adaptive Resource
Download Full-text
Handling System Overload Resulting from DDoS Attacks and Flash Crowd Events
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
◽
10.1109/cscloud.2015.66
◽
2015
◽
Cited By ~ 3
Author(s):
Zaid Al-Ali
◽
Basheer Al-Duwairi
◽
Ahmad T. Al-Hammouri
Keyword(s):
Ddos Attacks
◽
Handling System
◽
Flash Crowd
Download Full-text
Feature Analysis of Important Nodes in Microblog
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
◽
10.1109/cscloud.2015.65
◽
2015
◽
Author(s):
Yang Yang
◽
Hui Xu
◽
Yanan Liu
◽
Zhongwei Li
◽
Weishan Zhang
◽
...
Keyword(s):
Feature Analysis
◽
Important Nodes
Download Full-text
Message from the Program Chairs of IEEE CSCloud 2015
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
◽
10.1109/cscloud.2015.5
◽
2015
◽
Download Full-text
Combination in Advance Batch Multi-exponentiation on Elliptic Curve
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
◽
10.1109/cscloud.2015.88
◽
2015
◽
Author(s):
Rui Tao
◽
Jianwei Liu
◽
Hang Su
◽
Yang Sun
◽
Xiao Liu
Keyword(s):
Elliptic Curve
Download Full-text
Performance Metrics of Local Cloud Computing Architectures
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
◽
10.1109/cscloud.2015.61
◽
2015
◽
Cited By ~ 3
Author(s):
Travis Brummett
◽
Pezhman Sheinidashtegol
◽
Debadrita Sarkar
◽
Michael Galloway
Keyword(s):
Cloud Computing
◽
Performance Metrics
◽
Local Cloud
Download Full-text
Extending OWL to Support Custom Relations
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
◽
10.1109/cscloud.2015.74
◽
2015
◽
Cited By ~ 8
Author(s):
Khagesh Patel
◽
Ishaan Dube
◽
Lixin Tao
◽
Ning Jiang
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close