Latest developments of the below Transaction journal papers using Java and MySQL on different domains
Example DomainsĀ are Cloud Computing, Data Mining, Knowledge and Data Engineering, Internet of Things, Services Computing, Multimedia, Software Engineering, Parallel and Distributed Systems, Computational Social Systems, Information Security, Mobile Computing, Dependable and Secure Computing, Industrial Informatics, Learning Technologies, Information Processing over Networks, Information Processing over Networks, etc.
Cloud Computing
1 | A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing | 2017 |
2 | An Efficient and Fine-grained Big Data Access Control Scheme with Privacy- Preserving Policy | 2017 |
3 | TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud TEES (Traffic and Energy saving Encrypted Search) | 2017 |
4 | Attribute-Based Storage Supporting Secure De-duplication of Encrypted Data in Cloud. | 2017 |
5 | Efficient and Expressive Keyword Search Over Encrypted Data in Cloud. |
2017 |
6 | Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data | 2017 |
7 | RAAC: Robust and Auditable Access Control. With Multiple Attribute Authorities for. Public Cloud Storage | 2017 |
8 | FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data | 2017 |
9 | TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud | 2017 |
10 | Securing Cloud Data under Key Exposure | 2017 |
11 | Achieving Flexible and Self-Contained Data Protection in Cloud Computing | 2017 |
12 | Securing Aggregate Queries for DNA Databases | 2017 |
13 | FaaSeC: Enabling Forensics-as-a-Service for Cloud Computing Systems | 2017 |
14 | Privacy Protection based Access Control Scheme in Cloud-based Services. | 2017 |
15 | A Robust Reputation Management Mechanism In The Federated Cloud | 2017 |
16 | Fast Phrase Search for Encrypted Cloud Storage | 2017 |
17 | Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud | 2017 |
18 | Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing | 2017 |
19 | Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data | 2017 |
20 | Strong Key Exposure Resilient Auditing for Secure Cloud Storage | 2017 |
Data Mining / Knowledge and Data Engineering
21 | Semantically Enhanced Medical Information Retrieval System: A Tensor Factorization Based Approach | 2017 |
22 | Detecting Stress Based on Social Interactions in Social Networks | 2017 |
23 | Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach | 2017 |
24 | PPRank: Economically Selecting Initial Users for. Influence Maximization in Social Networks | 2017 |
25 | SocialQ&A: An Online Social Network Based Question and Answer System | 2017 |
26 | Personal Web Revisitation by Context and Content Keywords with Relevance Feedback | 2017 |
27 | Computing Semantic Similarity of Concepts in Knowledge Graphs | 2017 |
28 | A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks | 2017 |
29 | User Vitality Ranking and Prediction in Social Networking Services: A Dynamic Network Perspective | 2017 |
30 | Analyzing Sentiments in One Go A Supervised Joint Topic Modeling Approach. | 2017 |
31 | User-Centric Similarity Search | 2017 |
32 | Dynamic Facet Ordering for Faceted Product Search Engines | 2017 |
33 | Search Rank Fraud and Malware Detection in Google Play | 2017 |
34 | Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data | 2017 |
35 | Influence Maximization in Trajectory Databases | 2017 |
36 | Towards Real-Time, Country-Level Location Classification of Worldwide Tweets | 2017 |
37 | An Iterative Classification Scheme for Sanitizing Large-Scale Datasets | 2017 |
38 | DA: A Query-Driven Approach to Entity Resolution | 2017 |
39 | Mining Competitors from Large Unstructured Datasets | 2017 |
40 | Aspect-Level Sentiment Analysis | 2017 |
41 | Incremental Semi Supervised Clustering Ensemble for High Dimensional Data Clustering | 2017 |
42 | Trajectory Community Discovery and Recommendation by Multi-Source Diffusion Modeling | 2017 |
Internet of Things
43 | Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks | 2017 |
44 | Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems | 2017 |
Services Computing
45 | Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method | 2017 |
46 | Transactional Behavior Verification in Business Process as a Service Configuration | 2017 |
Multimedia
47 | Two-Stage Friend Recommendation Based on Network Alignment and Series Expansion of Probabilistic Topic Model | 2017 |
Software Engineering
48 | A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection | 2017 |
Parallel and Distributed Systems
49 | iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence | 2017 |
Computational Social Systems
50 | Collaborative Filtering-Based Recommendation of Online Social Voting | 2017 |
Computers
51 | Privacy-Preserving Selective Aggregation of Online User Behavior Data | 2017 |
Information Security
52 | ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions | 2017 |
Mobile Computing
53 | Quantifying Interdependent Privacy Risks with Location Data | 2017 |
54 | Searching Trajectories by Regions of Interest | 2017 |
Dependable and Secure Computing
55 | Towards Detecting Compromised Accounts on Social Networks | 2017 |
Industrial Informatics
56 | Public Interest Analysis Based on Implicit Feedback of IPTV Users | 2017 |
Learning Technologies
57 | Privacy-Preserving Learning Analytics: Challenges and Techniques | 2017 |
Information Processing over Networks
58 | When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks | 2017 |
Information Processing over Networks
59 | Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending | 2017 |
60 | NetSpam: A Network-Based Spam Detection Framework for Reviews in Online Social Media | 2017 |
please provide the topics from “Intrusion detection technique”.
Pls provide the total document for a robust reputation management mechanism in federated cloud topic