Security, Privacy, and Anonymity in Computation, Communication, and Storage
暂无分享,去创建一个
Kim-Kwang Raymond Choo | Mohammed Atiquzzaman | Zheng Yan | Guojun Wang | Mohammed Atiquzzaman | Guojun Wang | Zheng Yan
[1] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[2] Elisa Bertino,et al. Botnets and Internet of Things Security , 2017, Computer.
[3] James A. Jerkins. Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).
[4] Roksana Boreli,et al. Smart-Phones Attacking Smart-Homes , 2016, WISEC.
[5] David G. Andersen,et al. Design Guidelines for High Performance RDMA Systems , 2016, USENIX ATC.
[6] Dhabaleswar K. Panda,et al. High Performance Design for HDFS with Byte-Addressability of NVM and RDMA , 2016, ICS.
[7] Dawn Song,et al. Smart Locks: Lessons for Securing Commodity Internet of Things Devices , 2016, AsiaCCS.
[8] Earlence Fernandes,et al. Security Analysis of Emerging Smart Home Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[9] Adi Shamir,et al. Extended Functionality Attacks on IoT Devices: The Case of Smart Lights , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[10] Daniele Sgandurra,et al. Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems , 2016, ACM Comput. Surv..
[11] Tao Zhou,et al. The H-index of a network node and its relation to degree and coreness , 2016, Nature Communications.
[12] Vijay Varadharajan,et al. Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT) , 2015, 2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS).
[13] Ming Tang,et al. Numerical identification of epidemic thresholds for susceptible-infected-recovered model on finite-size networks , 2015, Chaos.
[14] Mrinmoy Ghosh,et al. Performance analysis of NVMe SSDs and their implication on real world databases , 2015, SYSTOR.
[15] Jian Yang,et al. Mojim: A Reliable and Highly-Available Non-Volatile Memory System , 2015, ASPLOS.
[16] Li Zhang,et al. C-Hint: An Effective and Reliable Cache Management for RDMA-Accelerated Key-Value Stores , 2014, SoCC.
[17] George J. Vachtsevanos,et al. Handbook of Unmanned Aerial Vehicles , 2014 .
[18] Kim-Kwang Raymond Choo,et al. Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users , 2014, Behav. Inf. Technol..
[19] Sanjay Kumar,et al. System software for persistent memory , 2014, EuroSys '14.
[20] Hyojun Kim,et al. Evaluating Phase Change Memory for Enterprise Storage Systems: A Study of Caching and Tiering Approaches , 2014, TOS.
[21] Busra Ozdenizci,et al. A Survey on Near Field Communication (NFC) Technology , 2012, Wireless Personal Communications.
[22] Xiaofang Zhao,et al. VegaIndexer: A Distributed composite index scheme for big spatio-temporal sensor data on cloud , 2013, 2013 IEEE International Geoscience and Remote Sensing Symposium - IGARSS.
[23] Shao-Liang Chang,et al. Study on the Feasibility of NFC P2P Communication for Nursing Care Daily Work , 2013 .
[24] Jinyang Li,et al. Using One-Sided RDMA Reads to Build a Fast, CPU-Efficient Key-Value Store , 2013, USENIX ATC.
[25] Flavio D. Garcia,et al. A Toolbox for RFID Protocol Analysis , 2012 .
[26] Flavio D. Garcia,et al. Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research , 2012 .
[27] Zhang Wenbo. Research on Dynamic Scaling of Elastic Distributed Cache Systems , 2012 .
[28] Kenneth A. Ross,et al. Path processing using Solid State Storage , 2012, ADMS@VLDB.
[29] A. L. Narasimha Reddy,et al. SCMFS: A file system for Storage Class Memory , 2011, 2011 International Conference for High Performance Computing, Networking, Storage and Analysis (SC).
[30] Jie Tang,et al. Who will follow you back?: reciprocal relationship prediction , 2011, CIKM '11.
[31] Rajesh K. Gupta,et al. Onyx: A Prototype Phase Change Memory Storage Array , 2011, HotStorage.
[32] Luis Ceze,et al. Operating System Implications of Fast, Cheap, Non-Volatile Memory , 2011, HotOS.
[33] Zhao Jun. On Design & Realization of Dispersed Cache Based on Zookeeper , 2011 .
[34] Mark Newman,et al. Networks: An Introduction , 2010 .
[35] Yang Xiao-hu. Storage Model Based on Distributed Cache for Message Oriented Middleware , 2010 .
[36] Christopher Frost,et al. Better I/O through byte-addressable, persistent memory , 2009, SOSP '09.
[37] Paolo Faraboschi,et al. Operating System Support for NVM+DRAM Hybrid Main Memory , 2009, HotOS.
[38] Jure Leskovec,et al. Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..
[39] Sergey N. Dorogovtsev,et al. Critical phenomena in complex networks , 2007, ArXiv.
[40] Brad Fitzpatrick,et al. Distributed caching with memcached , 2004 .
[41] Matthew Richardson,et al. Trust Management for the Semantic Web , 2003, SEMWEB.
[42] Ten-See Wang. Analysis of Linear Aerospike Plume-Induced X-33 Base-Heating Environment , 1999 .