Program, Best Papers, Keynotes > Selected Papers

Regular Papers:

ATC-1
Trung Phan Van, Minho Park and Bao Nguyen Khac. 
A Novel Hybrid Flow-based Handler with DDoS Attacks in Software-Defined Networking

ATC-2
Julio Bondia-Barceló, Jordi Castellà-Roca and Alexandre Viejo. 
Building Privacy-Preserving Search Engine Query Logs for Data Monetization

ATC-3
Robin Ankele, Kubilay Kuecuek, Andrew Martin, Andrew Simpson and Andrew Paverd. 
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications

ATC-4
Christophe Lohr, Philippe Tanguy and Jérôme Kerdreux. 
Choosing security elements for the xAAL home automation system

ATC-5
Francis Rousseaux and Pierre Saurel.
In light of the legal debate over personal data privacy at a time of globalized Big Data

ATC-6
Valentin Tudor, Magnus Almgren and Marina Papatriantafilou. 
Employing Private Data in AMI Applications: Short Term Load Forecasting Using Differentially Private Aggregated Data

ATC-7
Michael Denzel, Alessandro Bruni and Mark Ryan. 
Smart-Guard: Defending User Input from Malware

ATC-8
Till Neudecker, Philipp Andelfinger and Hannes Hartenstein. 
Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network

ATC-9
Pierrick Marie, Thierry Desprats, Sophie Chabridon and Michelle Sibilla. 
Enabling self-configuration of QoC-centric fog computing entities

ATC-10
Hagen Lauer and Nicolai Kuntze. 
Hypervisor-based Attestation of Virtual Environments

ATC-11
Andrea De Salve, Barbara Guidi, Paolo Mori and Laura Ricci. 
Distributed Coverage of Ego networks in F2F Online Social Networks

ATC-12
Deng Zhao and Zhangbing Zhou. 
Multi-Application Query Optimization for Shared WSNs Leveraging Caching Mechanism

ATC-13
Weilong Ding, Zhuofeng Zhao and Yanbo Han. 
An Adaptive Replica Mechanism for Real-time Stream Processing

ATC-14
Martin Harrigan. 
The Unreasonable Effectiveness of Address Clustering

ATC-15
Christopher Jämthagen and Martin Hell. 
Blockchain-based publishing layer for the Keyless Signing Infrastructure

ATC-16
Shayan Eskandari, Jeremy Clark and Abdelwahab Hamou-Lhadj. 
Buy your coffee with Bitcoin: Real-World Deployment of Bitcoin Point of Sale

ATC-17
Alessandro Sforzin, Felix Gomez Marmol, Mauro Conti and Jens-Matthias Bohli. RPiDS: 
Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT

ATC-18
Amit Biswas and Animesh Dutta. 
A Timer Based Leader Election Algorithm

ATC-19
Sana Hamdi, Alda Lopes Gancarsk, Amel Bouzeghoub and Sadok Ben Yahia. 
A new fuzzy clustering approach for reputation management in OSNs

ATC-20
Ayad Al-Adhami, Marcel Ambroze, Colin Cristopher, Ingo Stengel and Martin Tomlinson. 
A quorum system for distributing RFID tags

ATC-21
Zahra Hosseini and Zeinab Movahedi. 
A Green Trust Management Scheme to Mitigate Trust-distortion Attacks on MANETs

ATC-22
Chengming Qi, Zhangbing Zhou, Qun Wang and Lishuan Hu. 
A Framework of Multiple Kernel Ensemble Learning for Hyperspectral Classification

ATC-23
Tao Ban, Shaoning Pang, Masashi Eto, Daisuke Inoue, Koji Nakao and Runhe Huang. 
Towards Early Detection of Novel Attack Patterns from the Lens of A Large-Scale Darknet

ATC-24
Takafumi Tanaka, Hiroaki Hashiura, Atsuo Hazeyama, Seiichi Komiya, Yuki Hirai and Keiichi Kaneko. 
A Method for Collecting Learners' Thinking Process in ER Modeling Exercises and Its Application Experiment

ATC-25
Rumiko Kurita, Morigen Darai, Motoo Kusano, Masamitu Kiuchi and Cha Su Aie. 
A System for Facilitating the Discussions in Business Simulation Exercises Based on the Dual Advising Model

ATC-26
Kazuhiko Sato, Suresh Shrestha, Pramesh Shrestha and Bishnu Prasad Gautam. 
Implementation of Collaborative E-learning System for Unstable Environment

ATC-27
Hiroki Nakayama, Kodai Yamamoto, Katsunori Ogane, Hiroaki Kaminaga, Shoichi Nakamura and Youzou Miyadera. Estimation of the Error Factors in Programming Exercises Based on the Dynamic Revision of Case-base

ATC-28
Shoichi Nakamura, Ryo Onuma, Hiroki Nakayama, Tomohiro Funayama and Youzou Miyadera. 
Hybrid Analysis of Audience Gaze and Constitutive Features of Slides for Extracting the Defective Portions from Presentation Slides

Online user: 1