Security, Privacy, and Anonymity in Computation, Communication, and Storage

[1]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[2]  Elisa Bertino,et al.  Botnets and Internet of Things Security , 2017, Computer.

[3]  James A. Jerkins Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[4]  Roksana Boreli,et al.  Smart-Phones Attacking Smart-Homes , 2016, WISEC.

[5]  David G. Andersen,et al.  Design Guidelines for High Performance RDMA Systems , 2016, USENIX ATC.

[6]  Dhabaleswar K. Panda,et al.  High Performance Design for HDFS with Byte-Addressability of NVM and RDMA , 2016, ICS.

[7]  Dawn Song,et al.  Smart Locks: Lessons for Securing Commodity Internet of Things Devices , 2016, AsiaCCS.

[8]  Earlence Fernandes,et al.  Security Analysis of Emerging Smart Home Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[9]  Adi Shamir,et al.  Extended Functionality Attacks on IoT Devices: The Case of Smart Lights , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[10]  Daniele Sgandurra,et al.  Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems , 2016, ACM Comput. Surv..

[11]  Tao Zhou,et al.  The H-index of a network node and its relation to degree and coreness , 2016, Nature Communications.

[12]  Vijay Varadharajan,et al.  Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT) , 2015, 2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS).

[13]  Ming Tang,et al.  Numerical identification of epidemic thresholds for susceptible-infected-recovered model on finite-size networks , 2015, Chaos.

[14]  Mrinmoy Ghosh,et al.  Performance analysis of NVMe SSDs and their implication on real world databases , 2015, SYSTOR.

[15]  Jian Yang,et al.  Mojim: A Reliable and Highly-Available Non-Volatile Memory System , 2015, ASPLOS.

[16]  Li Zhang,et al.  C-Hint: An Effective and Reliable Cache Management for RDMA-Accelerated Key-Value Stores , 2014, SoCC.

[17]  George J. Vachtsevanos,et al.  Handbook of Unmanned Aerial Vehicles , 2014 .

[18]  Kim-Kwang Raymond Choo,et al.  Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users , 2014, Behav. Inf. Technol..

[19]  Sanjay Kumar,et al.  System software for persistent memory , 2014, EuroSys '14.

[20]  Hyojun Kim,et al.  Evaluating Phase Change Memory for Enterprise Storage Systems: A Study of Caching and Tiering Approaches , 2014, TOS.

[21]  Busra Ozdenizci,et al.  A Survey on Near Field Communication (NFC) Technology , 2012, Wireless Personal Communications.

[22]  Xiaofang Zhao,et al.  VegaIndexer: A Distributed composite index scheme for big spatio-temporal sensor data on cloud , 2013, 2013 IEEE International Geoscience and Remote Sensing Symposium - IGARSS.

[23]  Shao-Liang Chang,et al.  Study on the Feasibility of NFC P2P Communication for Nursing Care Daily Work , 2013 .

[24]  Jinyang Li,et al.  Using One-Sided RDMA Reads to Build a Fast, CPU-Efficient Key-Value Store , 2013, USENIX ATC.

[25]  Flavio D. Garcia,et al.  A Toolbox for RFID Protocol Analysis , 2012 .

[26]  Flavio D. Garcia,et al.  Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research , 2012 .

[27]  Zhang Wenbo Research on Dynamic Scaling of Elastic Distributed Cache Systems , 2012 .

[28]  Kenneth A. Ross,et al.  Path processing using Solid State Storage , 2012, ADMS@VLDB.

[29]  A. L. Narasimha Reddy,et al.  SCMFS: A file system for Storage Class Memory , 2011, 2011 International Conference for High Performance Computing, Networking, Storage and Analysis (SC).

[30]  Jie Tang,et al.  Who will follow you back?: reciprocal relationship prediction , 2011, CIKM '11.

[31]  Rajesh K. Gupta,et al.  Onyx: A Prototype Phase Change Memory Storage Array , 2011, HotStorage.

[32]  Luis Ceze,et al.  Operating System Implications of Fast, Cheap, Non-Volatile Memory , 2011, HotOS.

[33]  Zhao Jun On Design & Realization of Dispersed Cache Based on Zookeeper , 2011 .

[34]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[35]  Yang Xiao-hu Storage Model Based on Distributed Cache for Message Oriented Middleware , 2010 .

[36]  Christopher Frost,et al.  Better I/O through byte-addressable, persistent memory , 2009, SOSP '09.

[37]  Paolo Faraboschi,et al.  Operating System Support for NVM+DRAM Hybrid Main Memory , 2009, HotOS.

[38]  Jure Leskovec,et al.  Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..

[39]  Sergey N. Dorogovtsev,et al.  Critical phenomena in complex networks , 2007, ArXiv.

[40]  Brad Fitzpatrick,et al.  Distributed caching with memcached , 2004 .

[41]  Matthew Richardson,et al.  Trust Management for the Semantic Web , 2003, SEMWEB.

[42]  Ten-See Wang Analysis of Linear Aerospike Plume-Induced X-33 Base-Heating Environment , 1999 .