Load Balancing Method Based on a Performance and Power Ratio (English)
- New search for: Tian, Junfeng
- New search for: Ma, Yanwei
- New search for: Tian, Junfeng
- New search for: Ma, Yanwei
In:
2018 13th Asia Joint Conference on Information Security (AsiaJCIS)
;
75-82
;
2018
-
ISBN:
- Conference paper / Electronic Resource
-
Title:Load Balancing Method Based on a Performance and Power Ratio
-
Contributors:Tian, Junfeng ( author ) / Ma, Yanwei ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2018-08-01
-
Size:586560 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Title Page i| 2018
- 1
-
VISNU: A Novel Visualization Methodology of Security Events Optimized for a Centralized SOCKwon, Taewoong / Song, Jung-suk / Choi, Sangsu / Lee, Yunsoo / Park, Jinhak et al. | 2018
- 3
-
Title Page iii| 2018
- 4
-
Copyright Page| 2018
- 5
-
Table of Contents| 2018
- 8
-
Protecting Struts 2 from OGNL Related Attacks by Using Servlet FilterFujimoto, Mariko / Matsuda, Wataru / Mitsunaga, Takuho et al. | 2018
- 8
-
Message from the AsiaJCIS 2018 General Co-Chairs| 2018
- 9
-
Message from the AsiaJCIS 2018 Program Co-Chairs| 2018
- 10
-
AsiaJCIS 2018 Conference Organization| 2018
- 12
-
AsiaJCIS 2018 Program Committee| 2018
- 14
-
AsiaJCIS 2018 Acknowledgments| 2018
- 15
-
Time Series Analysis of Copy-and-Paste Impact on Android Application SecurityImai, Hironori / Kanaoka, Akira et al. | 2018
- 23
-
Efficient Card-Based Cryptographic Protocols for the Millionaires' Problem Using Private Input OperationsOno, Hibiki / Manabe, Yoshifumi et al. | 2018
- 29
-
An Efficient Oblivious Transfer Protocol with Access ControlLiao, Yaqing / Zhou, Jing / Yang, Yang / Ruan, Ou et al. | 2018
- 35
-
Transformation between Attribute-Based Encryption and Key-Aggregate CryptosystemFan, Chun-I / Tseng, Yi-Fan / E, Cheng-Yuan / Huang, Jheng-Jia et al. | 2018
- 42
-
Toward a Resilient System: The Inspiration from Information Security Management ApplianceXu, Ming / Cheng, Yu / Yin, QiXin et al. | 2018
- 47
-
Helping Johnny to Search: Encrypted Search on Webmail SystemMidorikawa, Tatsuya / Tachikawa, Akihiro / Kanaoka, Akira et al. | 2018
- 54
-
An Algorithm Based on Influence to Predict Invisible RelationshipTian, Junfeng / Xue, Lizheng / Cai, Hongyun et al. | 2018
- 62
-
Trust Elevation Scheme Based on Entropy-Specific Biometric Authentication Methods for the Financial SectorKim, Ji Hye / Kim, Mee Yeon / Youm, Heung Youl et al. | 2018
- 69
-
Power Attack and Protected Implementation on Lightweight Block Cipher SKINNYGe, Jing / Xu, Yifan / Liu, Ruiqian / Si, Enze / Shang, Ning / Wang, An et al. | 2018
- 75
-
Load Balancing Method Based on a Performance and Power RatioTian, Junfeng / Ma, Yanwei et al. | 2018
- 83
-
A Survey of Return-Oriented Programming Attack, Defense and Its Benign UseWang, Jingyuan / Xie, Peidai / Wang, Yongjun / Rong, Zelin et al. | 2018
- 89
-
Evaluating Disassembly-Code Based Similarity between IoT Malware SamplesIsawa, Ryoichi / Ban, Tao / Tie, Ying / Yoshioka, Katsunari / Inoue, Daisuke et al. | 2018
- 95
-
Development of White List Based Autonomous Evolution of Defense System for RAT MalwareShigemoto, Tomohiro / Fujii, Shota / Kuriama, Ichiro / Kito, Tetsuro / Nakakoji, Hirofumi / Fujii, Yasuhiro / Kikuchi, Hiroaki et al. | 2018
- 102
-
A Lightweight Host-Based Intrusion Detection Based on Process Generation PatternsTsuda, Yu / Nakazato, Junji / Takagi, Yaichiro / Inoue, Daisuke / Nakao, Koji / Terada, Kenjiro et al. | 2018
- 109
-
Constructing a Complete Timeline of a Security Incident by Aggregating ReportsKuzuno, Hiroki / Inagaki, Shun / Magata, Kenichi et al. | 2018
- 117
-
Author Index| 2018
- 118
-
Publisher's Information| 2018