{"title":"Sentinel: In Case of the Untrustworthy Behaviors Inside the Clouds","authors":"Dong Cui, C. Liu, Mengmeng Yang, Jincui Yang","doi":"10.1007/978-3-662-47401-3_13","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_13","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133771811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web-Based Heatmap of Physical Machines in Cloud Computing","authors":"Heng Chen, Xiaoshe Dong","doi":"10.1007/978-3-662-47401-3_14","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_14","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121250640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RSA Encryption/Decryption Implementation Based on Zedboard","authors":"Xu Bai, Lei Jiang, Xin-xing Liu, Jianlong Tan","doi":"10.1007/978-3-662-47401-3_15","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_15","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115468148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Feature Selection Method Based on Category Distribution and Phrase Attributes","authors":"Y. Zheng, Weihong Han, Chengzhang Zhu","doi":"10.1007/978-3-662-47401-3_4","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_4","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128500440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qipeng Yao, Chuan Zhou, Linbo Xiang, Yanan Cao, Li Guo
{"title":"Minimizing the Negative Influence by Blocking Links in Social Networks","authors":"Qipeng Yao, Chuan Zhou, Linbo Xiang, Yanan Cao, Li Guo","doi":"10.1007/978-3-662-47401-3_9","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_9","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126410848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reaching Critical Mass: The Effect of Adding New Content on Website Visitors and User Registration","authors":"Krishna Moniz, Yuyu Yuan","doi":"10.1007/978-3-662-47401-3_47","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_47","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134477903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yan Chen, Yiguo Pu, Xiaojun Chen, Jinqiao Shi, Xiaojie Yu
{"title":"CAS: Content Attribution System for Network Forensics","authors":"Yan Chen, Yiguo Pu, Xiaojun Chen, Jinqiao Shi, Xiaojie Yu","doi":"10.1007/978-3-662-47401-3_17","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_17","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128725587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Find Behaviors of Network Evasion and Protocol Obfuscation Using Traffic Measurement","authors":"Quan Bai, G. Xiong, Yong Zhao","doi":"10.1007/978-3-662-47401-3_45","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_45","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122584362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chao Ding, Mingxia Zeng, Kui Wang, Polo Pei, Zhongzhi Luan, D. Qian
{"title":"An Active Approach for Automatic Rule Discovery in Rule-Based Monitoring Systems","authors":"Chao Ding, Mingxia Zeng, Kui Wang, Polo Pei, Zhongzhi Luan, D. Qian","doi":"10.1007/978-3-662-47401-3_40","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_40","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123765551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Improvement and Implementation of iSLIP Algorithm Based on FPGA","authors":"Zeng Guang, Yao Lin, Zhao Ming, Ma Yilan","doi":"10.1007/978-3-662-47401-3_34","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_34","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132068758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}