


default search action
3. FDSE 2016: Can Tho City, Vietnam
- Tran Khanh Dang, Roland R. Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich J. Neuhold:

Future Data and Security Engineering - Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings. Lecture Notes in Computer Science 10018, 2016, ISBN 978-3-319-48056-5
Big Data Analytics and Cloud Data Management
- Markus Jäger

, Trong Nhan Phan, Christian Huber
, Josef Küng:
Incorporating Trust, Certainty and Importance of Information into Knowledge Processing Systems - An Approach. 3-19 - Thanh-Nghi Do, Minh-Thu Tran-Nguyen:

Incremental Parallel Support Vector Machines for Classifying Large-Scale Multi-class Image Datasets. 20-39 - Duong Ngoc Hieu, Thai Tieu Minh, Trinh Van Quang, Bui Xuan Giang, Tran Van Hoai:

A Machine Learning-Based Approach for Predicting the Execution Time of CFD Applications on Cloud Computing Environment. 40-52 - Trong Nhan Phan, Markus Jäger

, Stefan Nadschläger, Pablo Gómez-Pérez, Christian Huber, Josef Küng, Cong An Nguyen:
TLCSim: A Large-Scale Two-Level Clustering Similarity Search with MapReduce. 53-71
Internet of Things and Applications
- Andrzej Chmielewski

, Maciej Brzozowski:
Immune Approach to the Protection of IoT Devices. 75-92 - Vo-Que Son, Ta Tri Nghia, Nguyen Ho Ba Hai, Nguyen Binh Phuong:

Implementation and Performance Evaluation of Vehicle-Moving Based Routing Protocol in VANET. 93-104 - Khanh Le, Toan Nguyen, Thanh Cao, Thang H. Bui, Tho Quan:

Heuristic-Guided Verification for Fast Congestion Detection on Wireless Sensor Networks. 105-116
Security and Privacy Engineering
- Raimundas Matulevicius

, Alex Norta
, Chibozur Udokwu
, Rein Nõukas:
Security Risk Management in the Aviation Turnaround Sector. 119-140 - Loïc Bontemps, Van Loi Cao

, James McDermott, Nhien-An Le-Khac
:
Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks. 141-152 - Bao An Tran, Viet-Hong Tran:

A Novel Encryption Mechanism for Door Lock to Resist Jam-and-Relay Attack. 153-163 - Camilo Albarracin, Brayan S. Reyes Daza, Octavio J. Salcedo Parra:

Information and Identity Theft Without ARP Spoofing in LAN Environments. 164-171
Data Protection and Data Hiding
- Sapana Rani, Dileep Kumar Koshley, Raju Halder

:
A Watermarking Framework for Outsourced and Distributed Relational Databases. 175-188 - Quynh Chi Truong, Tran Khanh Dang

, Trung Ha:
Face Quality Measure for Face Authentication. 189-198 - Vu Thanh Nguyen, Cao Ngoc Tuan, Ly Tan Dung, Vo Minh Hai, Toan Tan Nguyen:

Computer Virus Detection Method Using Feature Extraction of Specific Malicious Opcode Sets Combine with aiNet and Danger Theory. 199-208 - Minh-Tuan Dang, Tuan A. Nguyen:

Using Graph Database for Evidence Correlation on Android Smartphones. 209-216
Advances in Authentication and Data Access Control
- Phu H. Phung

, Quang Tran Minh:
DASSR: A Distributed Authentication Scheme for Secure Routing in Wireless Ad-hoc Networks. 219-236 - Jan Kubovy, Christian Huber

, Markus Jäger
, Josef Küng:
A Secure Token-Based Communication for Authentication and Authorization Servers. 237-250 - Thanh Tien Nguyen, Nguyen Hoang Nam Pham, Que Nguyet Tran Thi:

An Enhancement of the Rew-XAC Model for Workflow Data Access Control in Healthcare. 251-263
Access Control in NoSQL and Big Data
- Anh Tuan Truong, Silvio Ranise

:
ASASPXL: New Clother for Analysing ARBAC Policies. 267-284 - Nadia Metoui

, Michele Bezzi, Alessandro Armando
:
Trust and Risk-Based Access Control for Privacy Preserving Threat Detection Systems. 285-304 - Que Nguyet Tran Thi, Tran The Si, Tran Khanh Dang

:
Fine Grained Attribute Based Access Control Model for Privacy Protection. 305-316 - Nguyen Hoang Nam Pham, Thanh Tien Nguyen, Kim Tuyen Le Thi:

A Supporting Automatically Mechanism for Data Owner Preventing Personal Privacy from Colluding Attack on Online Social Networks. 317-328
Context-Based Data Analysis and Applications
- Huynh Thanh-Tai, Huu-Hoa Nguyen

, Nguyen Thai-Nghe
:
A Semantic Approach in Recommender Systems. 331-343 - Chien D. C. Ta, Tuoi Phan Thi:

Automatic Extraction of Semantic Relations from Text Documents. 344-351
Emerging Data Management Systems and Applications
- Dirk Draheim

:
The Present and Future of Large-Scale Systems Modeling and Engineering. 355-370 - Sigrid Felt, Ingmar Pappel, Ingrid Pappel

:
An Overview of Digital Signing and the Influencing Factors in Estonian Local Governments. 371-384 - Trung-Viet Nguyen, Lam-Son Lê, Khuong Nguyen-An

:
Aggregating Service Level Agreements in Services Bundling: A Semiring-Based Approach. 385-399 - Faiza Sadi, T. Van Ut, Nguyen Huynh Tuong

, Ameur Soukhal:
Non-disjoint Multi-agent Scheduling Problem on Identical Parallel Processors. 400-414 - Ana Fernandes

, Henrique Vicente
, Margarida Figueiredo
, Mariana Neves, José Neves
:
An Evaluative Model to Assess the Organizational Efficiency in Training Corporations. 415-428

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














