{"title":"An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources","authors":"Peige Ren, Xiaofeng Wang, Hao Sun, Bao-kang Zhao, Chunqing Wu","doi":"10.1007/978-3-642-55032-4_68","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_68","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125752434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Chiroma, S. A. Kareem, Adamu I. Abubakar, Eka Novita Sari, T. Herawan, A. Gital
{"title":"Hybridization of Haar Wavelet Decomposition and Computational Intelligent Algorithms for the Estimation of Climate Change Behavior","authors":"H. Chiroma, S. A. Kareem, Adamu I. Abubakar, Eka Novita Sari, T. Herawan, A. Gital","doi":"10.1007/978-3-642-55032-4_23","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_23","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132865607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet","authors":"Tao Jiang, Xiaofeng Chen, Jin Li, Jianfeng Ma","doi":"10.1007/978-3-642-55032-4_63","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_63","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130849591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Chiroma, S. A. Kareem, Adamu I. Abubakar, Eka Novita Sari, T. Herawan
{"title":"A Novel Approach to Gasoline Price Forecasting Based on Karhunen-Loève Transform and Network for Vector Quantization with Voronoid Polyhedral","authors":"H. Chiroma, S. A. Kareem, Adamu I. Abubakar, Eka Novita Sari, T. Herawan","doi":"10.1007/978-3-642-55032-4_25","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_25","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134450617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Analysis of Public Key Encryptions Based on Conjugacy Search Problem","authors":"A. Yamamura","doi":"10.1007/978-3-642-55032-4_57","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_57","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133582115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peige Ren, Xiaofeng Wang, Chunqing Wu, Bao-kang Zhao, Hao Sun
{"title":"A Semantic-Based Malware Detection System Design Based on Channels","authors":"Peige Ren, Xiaofeng Wang, Chunqing Wu, Bao-kang Zhao, Hao Sun","doi":"10.1007/978-3-642-55032-4_67","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_67","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132927501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concern Based SaaS Application Architectural Design","authors":"Aldo Suwandi, I. Liem, Saiful Akbar","doi":"10.1007/978-3-642-55032-4_22","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_22","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133466977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marcel Fourné, Kevin Stegemann, Dominique Petersen, N. Pohlmann
{"title":"Aggregation of Network Protocol Data Near Its Source","authors":"Marcel Fourné, Kevin Stegemann, Dominique Petersen, N. Pohlmann","doi":"10.1007/978-3-642-55032-4_49","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_49","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125538781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LDFGB Algorithm for Anomaly Intrusion Detection","authors":"Shang-nan Yin, Zhi-Guo Chen, Sung-Ryul Kim","doi":"10.1007/978-3-642-55032-4_39","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_39","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125911470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assets Dependencies Model in Information Security Risk Management","authors":"J. Breier, F. Schindler","doi":"10.1007/978-3-642-55032-4_40","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_40","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122983991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}