|
Part I Security Fundamentals |
|
|
|
1 A Secure Service Framework for Handling Security Critical Data on the Public Cloud |
|
|
3 | (10) |
|
|
|
2 The Understanding of Building Trust Model on Smartphone Application: Focusing on Users' Motivation |
|
|
13 | (8) |
|
|
|
|
3 Towards Understanding Deterrence: Information Security Managers' Perspective |
|
|
21 | (20) |
|
|
|
|
|
Part II Industrial and Business Information Security |
|
|
|
4 Design of Attribute-Based Access Control in Cloud Computing Environment |
|
|
41 | (10) |
|
|
|
|
5 Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting |
|
|
51 | (18) |
|
|
|
|
|
6 Controlling Decryption of Personal Health Records in the Cloud |
|
|
69 | (12) |
|
|
|
7 Access Control Mechanism for XML Document |
|
|
81 | (10) |
|
|
|
8 A Collaborative Intrusion Detection System Framework for Cloud Computing |
|
|
91 | (20) |
|
|
|
9 Criteria for Comparing Cyberwarfare Capability |
|
|
111 | (12) |
|
|
|
Part III Security Protocols and Applications |
|
|
|
10 A RSSI-Based Approach for Localization of Wireless Sensor Network in Indoor |
|
|
123 | (6) |
|
|
|
|
|
|
11 Semantic Search and Retrieval System for Learning Objects |
|
|
129 | (16) |
|
|
|
|
|
|
12 Wear Leveling for PCM Using Hot Data Identification |
|
|
145 | (6) |
|
|
|
13 Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine |
|
|
151 | (12) |
|
|
|
|
|
|
14 HARD: Host-Level Address Remapping Driver for Solid-State Disk |
|
|
163 | (6) |
|
|
|
15 Ubiquitous Based Personalized Hypertension Monitoring System |
|
|
169 | (10) |
|
|
|
|
|
|
16 Customized IPTV Content Recommendation Service Model Based on Personal Preference |
|
|
179 | (12) |
|
|
|
|
17 A Study on the Touch Process of Android Smartphone on Froyo and Gingerbread |
|
|
191 | (14) |
|
|
|
|
18 Case Study of QoS-Assured Convergence Service Overlay in Open Service Platform Environment |
|
|
205 | (12) |
|
|
|
|
19 Aspect Oriented Software Development Using Requirement Engineering |
|
|
217 | (6) |
|
|
|
20 A Review of Accelerometer-Based Physical Activity Measurement |
|
|
223 | (16) |
|
|
|
21 A Group Data Synchronization Protocol in Mobile Environments |
|
|
239 | (14) |
|
|
|
22 Efficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics |
|
|
253 | (14) |
|
|
|
Part IV Convergence Security |
|
|
|
23 A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications |
|
|
267 | (14) |
|
|
|
|
|
|
24 An Efficient Live Stream Community Management Scheme for the Mobile |
|
|
281 | (14) |
|
|
|
|
|
25 Development of Real-Time Gesture Recognition System Using Visual Interaction |
|
|
295 | (12) |
|
|
|
|
|
26 Architecture of Image Encryption Hardware Using Two Dimensional Cellular Automata |
|
|
307 | (10) |
|
|
27 Simulation of 3D Information Visualization |
|
|
317 | (8) |
|
|
|
28 Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks |
|
|
325 | (6) |
|
|
|
|
29 Development of Real-Time Location-Based Multimedia Style Slop Information Retrieval System |
|
|
331 | (6) |
|
|
30 Augmented Reality-Based Role-Playing Contents for Education |
|
|
337 | (8) |
|
|
|
|
|
31 Vertex Propagation for Fast Ray-Casting of Digital Elevation Model |
|
|
345 | (12) |
|
|
|
|
|
32 A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization |
|
|
357 | (10) |
|
|
|
33 Image Registration for Sub-Pixel Using Pyramid Edge Images |
|
|
367 | (6) |
|
|
|
|
|
|
34 Real-Time Camera Tracking Using Planar Object Detection |
|
|
373 | (6) |
|
|
|
|
|
|
35 Bidirectional Propagation Method for Analysis of Reflection on Radio Networks |
|
|
379 | (10) |
|
|
|
36 Robust Estimation of Heights of Moving People Using a Single Camera |
|
|
389 | (20) |
|
|
|
|
Part V IT Convergence Applications |
|
|
|
37 Goal-Heuristic Analysis Method for an Adaptive Process Mining |
|
|
409 | (10) |
|
|
|
|
|
|
38 Security Threat Modeling and Requirement Analysis Method Based on Goal-Scenario |
|
|
419 | (6) |
|
|
|
|
39 An Effective Learning Method in Art Using Virtual Reality and Ontology |
|
|
425 | (10) |
|
|
|
|
|
40 Development of Pain Prescription Decision Systems for Nursing Intervention |
|
|
435 | (10) |
|
|
|
|
41 Performance Sensibility Influence of Recommended Makeup Styles |
|
|
445 | (10) |
|
|
|
|
42 Affective Social Network |
|
|
455 | (8) |
|
|
43 A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker |
|
|
463 | (6) |
|
|
|
44 Discovering Knowledge Flow in Social Network |
|
|
469 | (10) |
|
|
45 Model Optimization with Graph Transformation and PSO Algorithm for Model Transformation Verification |
|
|
479 | (10) |
|
|
|
|
46 Pattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification |
|
|
489 | (6) |
|
|
|
|
47 Improved Performance of Emotion Extraction Through Banned Words |
|
|
495 | (12) |
|
|
|
48 Potential Emotion Word in Movie Dialog |
|
|
507 | (10) |
|
|
|
|
49 Story Modeling for Green Light Decision Making |
|
|
517 | (6) |
|
|
|
50 Reducing the Gap of Provided Services and Requires Services Based on Service Approach |
|
|
523 | (16) |
|
|
|
|
51 An Extended XML Compression Technique for XML Element Retrieval |
|
|
539 | (18) |
|
|
|
Part VI Mobile Computing and Future Networks |
|
|
|
52 Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System |
|
|
557 | (4) |
|
|
53 Types of Fuel Cells and Applications for Electricity and Heat Co-Generation |
|
|
561 | (6) |
|
|
54 Integrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid Environment |
|
|
567 | (8) |
|
|
|
|
Part VII Multimedia and Information Visualization |
|
|
|
55 Malware Detection Techniques Using Artificial Immune System |
|
|
575 | (14) |
|
Mohamed Ahmed Mohamed Ali |
|
|
|
56 A Survey on P2P Botnet Detection |
|
|
589 | (6) |
|
|
|
57 A Study on Instruction Substitution Analysis of Metamorphic Malware |
|
|
595 | (6) |
|
|
|
|
58 An Analysis of Malware Attached in Spam |
|
|
601 | (6) |
|
|
|
59 Detection Methods for Malware Variant Using API Call Related Graphs |
|
|
607 | (6) |
|
|
|
|
60 Malware Classification Methods Using API Sequence Characteristics |
|
|
613 | (16) |
|
|
|
|
Part VIII Web Technology and Software Engineering |
|
|
|
61 Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization |
|
|
629 | |
|
|
|
|