Loading…
Trusted Execution Environment: What It is, and What It is Not
Sabt, Mohamed, Achemlal, Mohammed, Bouabdallah, Abdelmadjid
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Loading…
From ZeuS to Zitmo: Trends in Banking Malware
Etaher, Najla, Weir, George R. S., Alazab, Mamoun
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Loading…
A Secure Northbound Interface for SDN Applications
Banse, Christian, Rangarajan, Sathyanarayanan
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Time Distortion Anonymization for the Publication of Mobility Data with High Utility
Primault, Vincent, Ben Mokhtar, Sonia, Lauradoux, Cedric, Brunie, Lionel
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
CRC-Based Message Authentication for 5G Mobile Technology
Dubrova, Elena, Naslund, Mats, Selander, Goran
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Information Security Awareness in Educational Institution: An Analysis of Students' Individual Factors
Farooq, Ali, Isoaho, Johanna, Virtanen, Seppo, Isoaho, Jouni
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Loading…
PEAS: Private, Efficient and Accurate Web Search
Petit, Albin, Cerqueus, Thomas, Ben Mokhtar, Sonia, Brunie, Lionel, Kosch, Harald
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Detecting Data Semantic: A Data Leakage Prevention Approach
Alneyadi, Sultan, Sithirasenan, Elankayer, Muthukkumarasamy, Vallipuram
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Loading…
Trust-Aware Review Spam Detection
Hao Xue, Fengjun Li, Hyunjin Seo, Pluretti, Roseann
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Android Cache Taxonomy and Forensic Process
Immanuel, Felix, Martini, Ben, Choo, Kim-Kwang Raymond
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks
Bradbury, Matthew, Leeke, Matthew, Jhumka, Arshad
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface
Guri, Mordechai, Poliak, Yuri, Shapira, Bracha, Elovici, Yuval
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
A MapReduce-Based k-Nearest Neighbor Approach for Big Data Classification
Maillo, Jesus, Triguero, Isaac, Herrera, Francisco
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…