Regular Papers:
ATC-1
Trung Phan Van, Minho Park and Bao Nguyen Khac.
A Novel Hybrid Flow-based Handler with DDoS Attacks in Software-Defined Networking
ATC-2
Julio Bondia-Barceló, Jordi Castellà-Roca and Alexandre Viejo.
Building Privacy-Preserving Search Engine Query Logs for Data Monetization
ATC-3
Robin Ankele, Kubilay Kuecuek, Andrew Martin, Andrew Simpson and Andrew Paverd.
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications
ATC-4
Christophe Lohr, Philippe Tanguy and Jérôme Kerdreux.
Choosing security elements for the xAAL home automation system
ATC-5
Francis Rousseaux and Pierre Saurel.
In light of the legal debate over personal data privacy at a time of globalized Big Data
ATC-6
Valentin Tudor, Magnus Almgren and Marina Papatriantafilou.
Employing Private Data in AMI Applications: Short Term Load Forecasting Using Differentially Private Aggregated Data
ATC-7
Michael Denzel, Alessandro Bruni and Mark Ryan.
Smart-Guard: Defending User Input from Malware
ATC-8
Till Neudecker, Philipp Andelfinger and Hannes Hartenstein.
Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network
ATC-9
Pierrick Marie, Thierry Desprats, Sophie Chabridon and Michelle Sibilla.
Enabling self-configuration of QoC-centric fog computing entities
ATC-10
Hagen Lauer and Nicolai Kuntze.
Hypervisor-based Attestation of Virtual Environments
ATC-11
Andrea De Salve, Barbara Guidi, Paolo Mori and Laura Ricci.
Distributed Coverage of Ego networks in F2F Online Social Networks
ATC-12
Deng Zhao and Zhangbing Zhou.
Multi-Application Query Optimization for Shared WSNs Leveraging Caching Mechanism
ATC-13
Weilong Ding, Zhuofeng Zhao and Yanbo Han.
An Adaptive Replica Mechanism for Real-time Stream Processing
ATC-14
Martin Harrigan.
The Unreasonable Effectiveness of Address Clustering
ATC-15
Christopher Jämthagen and Martin Hell.
Blockchain-based publishing layer for the Keyless Signing Infrastructure
ATC-16
Shayan Eskandari, Jeremy Clark and Abdelwahab Hamou-Lhadj.
Buy your coffee with Bitcoin: Real-World Deployment of Bitcoin Point of Sale
ATC-17
Alessandro Sforzin, Felix Gomez Marmol, Mauro Conti and Jens-Matthias Bohli. RPiDS:
Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT
ATC-18
Amit Biswas and Animesh Dutta.
A Timer Based Leader Election Algorithm
ATC-19
Sana Hamdi, Alda Lopes Gancarsk, Amel Bouzeghoub and Sadok Ben Yahia.
A new fuzzy clustering approach for reputation management in OSNs
ATC-20
Ayad Al-Adhami, Marcel Ambroze, Colin Cristopher, Ingo Stengel and Martin Tomlinson.
A quorum system for distributing RFID tags
ATC-21
Zahra Hosseini and Zeinab Movahedi.
A Green Trust Management Scheme to Mitigate Trust-distortion Attacks on MANETs
ATC-22
Chengming Qi, Zhangbing Zhou, Qun Wang and Lishuan Hu.
A Framework of Multiple Kernel Ensemble Learning for Hyperspectral Classification
ATC-23
Tao Ban, Shaoning Pang, Masashi Eto, Daisuke Inoue, Koji Nakao and Runhe Huang.
Towards Early Detection of Novel Attack Patterns from the Lens of A Large-Scale Darknet
ATC-24
Takafumi Tanaka, Hiroaki Hashiura, Atsuo Hazeyama, Seiichi Komiya, Yuki Hirai and Keiichi Kaneko.
A Method for Collecting Learners' Thinking Process in ER Modeling Exercises and Its Application Experiment
ATC-25
Rumiko Kurita, Morigen Darai, Motoo Kusano, Masamitu Kiuchi and Cha Su Aie.
A System for Facilitating the Discussions in Business Simulation Exercises Based on the Dual Advising Model
ATC-26
Kazuhiko Sato, Suresh Shrestha, Pramesh Shrestha and Bishnu Prasad Gautam.
Implementation of Collaborative E-learning System for Unstable Environment
ATC-27
Hiroki Nakayama, Kodai Yamamoto, Katsunori Ogane, Hiroaki Kaminaga, Shoichi Nakamura and Youzou Miyadera. Estimation of the Error Factors in Programming Exercises Based on the Dynamic Revision of Case-base
ATC-28
Shoichi Nakamura, Ryo Onuma, Hiroki Nakayama, Tomohiro Funayama and Youzou Miyadera.
Hybrid Analysis of Audience Gaze and Constitutive Features of Slides for Extracting the Defective Portions from Presentation Slides