Skip to main content
Model combination in classification, density estimation and clustering and forecasting has become a promising research area where better results are obtained compared to using single models. Bayesian inference offers two approaches for... more
    • by 
    •   3  
      Deep LearningSecure Cloud ComputingTime Series Forecasting
With the expanding interest for constant applications in the Wireless Senor Network (WSN), ongoing discriminating occasions suspect a proficient quality-of-service (QoS) based Routing for information conveyance from the Network... more
    • by 
    •   2  
      Computer NetworksSecure Cloud Computing
International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security.
    • by 
    •   2  
      Secure Cloud ComputingInformation Security Management
Social network is a group of individuals with diverse social interactions amongst them. The network large scale and distributed due to Quantitative analysis of networks is need of and in turn the society. Clustering helps us to group... more
    • by 
    •   14  
      Fuzzy SystemsGraph Data MiningFuzzy and Neuro-Fuzzy SystemsSNA (Social Network Analysis)
Security has been considered as the key concern of adopting cloud computing. This could be ascribed to the customers’ lack of control over their confidential data once in the cloud and to the absence of trust in cloud providers.... more
    • by 
    •   3  
      Cloud ComputingSecure Cloud ComputingCloud Computing Security
Social network is a group of individuals with diverse social interactions amongst them. The network large scale and distributed due to Quantitative analysis of networks is need of and in turn the society. Clustering helps us to group... more
    • by 
    •   12  
      Software SecurityNetwork SecurityWireless Sensor NetworksGenetic Fuzzy Systems
Physical location of data in cloud storage is an increasingly urgent problem. In a short time, it has evolved from the concern of a few regulated businesses to an important consideration for many cloud storage users. One of the... more
    • by  and +1
    •   5  
      Privacy and data protectionSecure Cloud ComputingSecurity in Cloud ComputingCloud Data Storage Security
Data outsourcing allows data owners to keep their data in public clouds, which do not ensure the privacy of data and computations. One fundamental and useful framework for processing data in a distributed fashion is MapReduce. In this... more
    • by  and +1
    •   10  
      Information SecurityDatabase SystemsComputer SecurityCloud Computing
The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing
Photo sharing is an attractive feature which popularizes Online Social Networks (OSNs). Unfortunately, it may leak users' privacy if they are allowed to post, comment, and tag a photo freely.we attempt to address this issue and study the... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computation
Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era. The threat now extends to our personal lives: a plethora of personal information... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but require a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing
A number of studies on privacy-preserving data mining have been proposed. Most of them assume that they can separate quasi-identifiers (QIDs) from sensitive attributes. For instance, they assume that address, job, and age are QIDs but are... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing
Model combination in classification, density estimation and clustering and forecasting has become a promising research area where better results are obtained compared to using single models. Bayesian inference offers two approaches for... more
    • by 
    •   4  
      Deep LearningSecure Cloud ComputingAIMLTime Series Forecasting
Understanding the spreading dynamics of computer viruses (worms, attacks) is an important research problem, and has received much attention from the communities of both computer security and statistical physics. However, previous studies... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a large number of customers. Unfortunately, virtualization... more
    • by 
    •   15  
      Computer ScienceComputer ArchitectureInformation SecurityComputer Engineering
Tons of online user behavior data are being generated every day on the booming and ubiquitous Internet. Growing effortshave been devoted to mining the abundant behavior data to extract valuable information for research purposes or... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing