Program, Best Papers, Keynotes > Selected Papers

Regular Papers:

Trung Phan Van, Minho Park and Bao Nguyen Khac. 
A Novel Hybrid Flow-based Handler with DDoS Attacks in Software-Defined Networking

Julio Bondia-Barceló, Jordi Castellà-Roca and Alexandre Viejo. 
Building Privacy-Preserving Search Engine Query Logs for Data Monetization

Robin Ankele, Kubilay Kuecuek, Andrew Martin, Andrew Simpson and Andrew Paverd. 
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications

Christophe Lohr, Philippe Tanguy and Jérôme Kerdreux. 
Choosing security elements for the xAAL home automation system

Francis Rousseaux and Pierre Saurel.
In light of the legal debate over personal data privacy at a time of globalized Big Data

Valentin Tudor, Magnus Almgren and Marina Papatriantafilou. 
Employing Private Data in AMI Applications: Short Term Load Forecasting Using Differentially Private Aggregated Data

Michael Denzel, Alessandro Bruni and Mark Ryan. 
Smart-Guard: Defending User Input from Malware

Till Neudecker, Philipp Andelfinger and Hannes Hartenstein. 
Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network

Pierrick Marie, Thierry Desprats, Sophie Chabridon and Michelle Sibilla. 
Enabling self-configuration of QoC-centric fog computing entities

Hagen Lauer and Nicolai Kuntze. 
Hypervisor-based Attestation of Virtual Environments

Andrea De Salve, Barbara Guidi, Paolo Mori and Laura Ricci. 
Distributed Coverage of Ego networks in F2F Online Social Networks

Deng Zhao and Zhangbing Zhou. 
Multi-Application Query Optimization for Shared WSNs Leveraging Caching Mechanism

Weilong Ding, Zhuofeng Zhao and Yanbo Han. 
An Adaptive Replica Mechanism for Real-time Stream Processing

Martin Harrigan. 
The Unreasonable Effectiveness of Address Clustering

Christopher Jämthagen and Martin Hell. 
Blockchain-based publishing layer for the Keyless Signing Infrastructure

Shayan Eskandari, Jeremy Clark and Abdelwahab Hamou-Lhadj. 
Buy your coffee with Bitcoin: Real-World Deployment of Bitcoin Point of Sale

Alessandro Sforzin, Felix Gomez Marmol, Mauro Conti and Jens-Matthias Bohli. RPiDS: 
Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT

Amit Biswas and Animesh Dutta. 
A Timer Based Leader Election Algorithm

Sana Hamdi, Alda Lopes Gancarsk, Amel Bouzeghoub and Sadok Ben Yahia. 
A new fuzzy clustering approach for reputation management in OSNs

Ayad Al-Adhami, Marcel Ambroze, Colin Cristopher, Ingo Stengel and Martin Tomlinson. 
A quorum system for distributing RFID tags

Zahra Hosseini and Zeinab Movahedi. 
A Green Trust Management Scheme to Mitigate Trust-distortion Attacks on MANETs

Chengming Qi, Zhangbing Zhou, Qun Wang and Lishuan Hu. 
A Framework of Multiple Kernel Ensemble Learning for Hyperspectral Classification

Tao Ban, Shaoning Pang, Masashi Eto, Daisuke Inoue, Koji Nakao and Runhe Huang. 
Towards Early Detection of Novel Attack Patterns from the Lens of A Large-Scale Darknet

Takafumi Tanaka, Hiroaki Hashiura, Atsuo Hazeyama, Seiichi Komiya, Yuki Hirai and Keiichi Kaneko. 
A Method for Collecting Learners' Thinking Process in ER Modeling Exercises and Its Application Experiment

Rumiko Kurita, Morigen Darai, Motoo Kusano, Masamitu Kiuchi and Cha Su Aie. 
A System for Facilitating the Discussions in Business Simulation Exercises Based on the Dual Advising Model

Kazuhiko Sato, Suresh Shrestha, Pramesh Shrestha and Bishnu Prasad Gautam. 
Implementation of Collaborative E-learning System for Unstable Environment

Hiroki Nakayama, Kodai Yamamoto, Katsunori Ogane, Hiroaki Kaminaga, Shoichi Nakamura and Youzou Miyadera. Estimation of the Error Factors in Programming Exercises Based on the Dynamic Revision of Case-base

Shoichi Nakamura, Ryo Onuma, Hiroki Nakayama, Tomohiro Funayama and Youzou Miyadera. 
Hybrid Analysis of Audience Gaze and Constitutive Features of Slides for Extracting the Defective Portions from Presentation Slides

Online user: 1