2014 UPDATED LIST
- A Framework For Selection Of Best Cloud Service Provider Using Ranked Voting Method
- Using Identity and Trust with Key Management for achieving security in Ad hoc Networks
- KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data
- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
- iFarm: Development of Cloud-based System of Cultivation Management for Precision Agriculture
- Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
- Automatic Medical Disease Treatment System Using Datamining
- A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
- Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
- A Log-based Approach to Make Digital Forensics Easier on Cloud Computing-
- Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
- Fault Node Recovery Algorithm for a Wireless Sensor Network
- Load Rebalancing for Distributed File Systems in Clouds
- Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
- E-MACs: Towards More Secure and More E_cient Constructions of Secure Channels
- Secure Mining of Association Rules in Horizontally Distributed Databases
- A FRAMEWORK FOR SELECTION OF BEST CLOUD SERVICE PROVIDER USING RANKED VOTING METHOD
- Using Identity and Trust with Key Management for achieving security in Ad hoc Networks
- KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data
CLOUD COMPUTING / BIG DATA
- A Load Balancing Model Based on Cloud Partitioning
- A Secure Client Side Deduplication Scheme in Cloud Storage Environments
- An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments
- Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
- EasySMS: A Protocol for End-to-End Secure Transmission of SMS
- Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
- CloudMoV: Cloud-based Mobile Social TV
- A packet marking approach to protect cloud environment against DDoS attacks
- C-MART: Benchmarking the Cloud Parallel and Distributed Systems
- Pre-emptive scheduling of on-line real time services with task migration for cloud computing
- Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data
- Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
- Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
- HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
- Secure Logging As a Service—Delegating Log Management to the Cloud
- Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
- A cloud computing based telemedicine service
- Privacy-Preserving Public Auditing for Secure Cloud Storage
- CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
- A Framework For Selection Of Best Cloud Service Provider Using Ranked Voting Method
- Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
- iFarm: Development of Cloud-based System of Cultivation Management for Precision Agriculture
- Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
- Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
- A Log-based Approach to Make Digital Forensics Easier on Cloud Computing-
- Energy-Efficient Link Selection and Transmission Scheduling in Mobile Cloud Computing
- Load Rebalancing for Distributed File Systems in Clouds
- Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
- Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
- NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds
- Privacy Preserving Cloud-based Computing Platform (PPCCP) for using Location Based Services
- Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
- An Improved Mutual Authentication Framework for Cloud Computing
BIG DATA
- Big Data as an e-Health Service
- Enabling Efficient Access Control with Dynamic Policy Updating for Big Data in the Cloud
- Load Balancing for Privacy-Preserving Access to Big Data in Cloud
- MRPrePost-A parallel algorithm adapted for mining big data
- Toward Efficient and Privacy-Preserving Computing in Big Data Era
- Towards Knowledge Discovery in Big Data
- Privacy Preserving Data Analytics for Smart Homes
- Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-grained Updates
- KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data
- Cost Minimization for Big Data Processing in Geo-Distributed Data Centers
- Dache: A Data Aware Caching for Big-Data Applications Using the MapReduce Framework
- ClubCF: A Clustering-based Collaborative Filtering Approach for Big Data Application
DATA MINING / WEBMINING / CYBER SECURITY
- Secure Mining of Association Rules in Horizontally Distributed Databases
- Traditional Set Based Approach in Mining Sequential Patterns
- A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective Privacy Preserving of Intermediate Datasets In cloud
- Automatic Medical Disease Treatment System Using Datamining
- Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
- Automatic Itinerary Planning for Traveling Services
- Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
- Keyword Query Routing
- The Role of Apriori Algorithm for Finding the Association Rules in Data Mining
CYBER SECURITY
- A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges
- Anonymous and Distributed Community Cyber Incident Detection
- Mission-centricity in cyber security: Architecting cyber attack resilient missions
- Efficient Protocols For Secure Broadcast In Controller Area Networks
- Efficient Protocols For Secure Broadcast In Controller Area Networks
- Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications
- Communication security for smart grid distribution networks
- Teaching RFID Information Systems Security[2013]
WIRELESS SENSOR NETWORK
- Adaptive and Secure Load-Balancing Routing Protocol for Service-Oriented Wireless Sensor Networks
- Throughput-Optimal Scheduling in Multihop Wireless Networks Without Per-Flow Information
- LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks
- Design and Implementation of TARF: A Trust-Aware Routing Framework for WSN
- Secure Authentication Scheme in Wireless Networks
- Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
- Fault Node Recovery Algorithm for a Wireless Sensor Network
- “Efficient Sensor Node Authentication in Wireless Integrated Sensor Networks Using Virtual Certificate Authority”
- Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning
- Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
INFORMATION SECURITY
- Attribute-Based Encryption With Verifiable Outsourced Decryption
- Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
- A Three Party Authentication for Key Distributed Protocol Using Classical and Quantum Cryptography
- E-MACs: Towards More Secure and More E_cient Constructions of Secure Channels
MOBILE COMPUTING
- Energy Efficient Cluster Based Routing Protocol for Wireless Sensor Networks
- SDSM: A Secure Data Service Mechanism in Mobile Cloud Computing
- DSS: Distributed SINR-Based Scheduling Algorithm for Multihop Wireless Networks
- Channel-Aware Routing in MANETs With Route Handoff (AOMDV)
- A Node-Disjoint Multipath Routing Method Based on AODV Protocol for MANETs
- An energy-efficient data storage scheme in wireless sensor networks
- The Black-hole node attack in MANET
- Fast Data Collection in Tree-Based Wireless Sensor Networks
- Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
- Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing
- Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
- On demand Temporary Route Recovery for Frequent Link Failures in Adhoc Networks
- Secure Distance-Based Localization In The Presence Of Cheating Beacon Nodes
DISTRIBUTED AND PARELLEL
- Distributed Private Key Generation for Identity Based Cryptosystems in Ad Hoc Networks
- DRINA: A Lightweight and Reliable Routing Approach for in-Network Aggregation in Wireless Sensor Networks
- The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
- A 3N Approach to Network Control and Management
- Towards Practical Communication in Byzantine-Resistant DHTs
- An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems
- Rumor Riding: Anonym zing Unstructured Peer-to-Peer Systems
- FDAC: Toward Fine-grained Distributed Data Access Control in Wireless Sensor Networks
- Consistent Monitoring System for Parallel and Distributed Systems
- Privacy Preserving Data Sharing with Anonymous ID Assignment
- Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems
- SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
- FireCol: a collaborative protection network for the detection of flooding DDoS attacks
- Timely and continuous machine-learning-based classification for interactive IP traffic
- Privacy- and integrity-preserving range queries in sensor networks
- Anomaly extraction in backbone networks using association rules
- Signature Neural Networks: Definition and Application to Multidimensional Sorting Problems
- Blind Image Quality Assessment Using a General RegressionNeural
- Modeling of Complex-Valued Wiener Systems Using B-Spline Neural Network.
NETWORKING / NETWORK + SECURITY
- EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
- Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks
- An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
- Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
- Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
- AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
- Computing localized power efficient data aggregation in Trees for sensor network
- Using Identity and Trust with Key Management for achieving security in Ad hoc Networks
- A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
- Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using uncertain Reasoning
- A Temporal Packet Marking Detection scheme against MIRA Attack in MANET
- EAACK—A Secure Intrusion-Detection System for MANETs
- Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
NETWORK+ SECURITY
- Design and Implementation of TARF: A Trust-Aware Routing Framework for WSN
- Secure Authentication Scheme in Wireless Networks
- Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
- A Three Party Authentication for Key Distributed Protocol Using Classical and Quantum Cryptography
- Nymble: Blocking Misbehaving Users in Anonym zing Networks
- FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
- A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network
- Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
- A group key agreement protocol based on stability & power using a Elliptical curve cryptography
- An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature
- Providing Witness Anonymity Under Peer-to-Peer Settings
- MABS Multicast Authentication Based on Batch Signature
KNOWLEDGE / DATA ENTRY / ARTIFICIAL INTELLIGENCE
- A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
- Anomaly Detection via Online Oversampling principal Component Analysis
- Lineage Encoding: An Efficient Wireless XML Streaming Supporting Twig Pattern Queries
- MKBoost: A Framework of Multiple Kernel Boosting
- TACI: Taxonomy-Aware Catalog Integration
- Mining Order-Preserving Submatrices from Data with Repeated Measurements
ARTIFICIAL INTELLIGENCE
- Distributed management system
- Cyber credit card system
- Advanced secured system
- Secure Multi signature generation for group communication
- Mobile payment service system
- Helthcare service system