Formal verification approaches and standards in the cloud computing: a comprehensive and systematic review
Cloud computing as a new internet-based computing model provides different resources as
a service dynamically. Today, cloud computing is actually one of the main improvements in …
a service dynamically. Today, cloud computing is actually one of the main improvements in …
Evaluating convolutional neural network for effective mobile malware detection
In last years smartphone and tablet devices have been handling an increasing variety of
sensitive resources. As a matter of fact, these devices store a plethora of information related …
sensitive resources. As a matter of fact, these devices store a plethora of information related …
Formal verification approaches in the web service composition: a comprehensive analysis of the current challenges for future research
Today, service composition is emerging paradigm on the communication networks such as
cloud environments, internet of things, wireless sensor network, and software‐defined …
cloud environments, internet of things, wireless sensor network, and software‐defined …
DiG-Park: a smart parking availability searching method using V2V/V2I and DGP-class problem
Localization systems for outdoor areas using GNSS based systems (like GPS, GLONASS
and more) are nowadays widespread and commonly-available in devices like smartphones …
and more) are nowadays widespread and commonly-available in devices like smartphones …
Multilayer perceptron: an intelligent model for classification and intrusion detection
Nowadays the security of computer devices is growing significantly. This is due to more and
more devices areconnected to the network. For this reason, optimize the performance of …
more devices areconnected to the network. For this reason, optimize the performance of …
The vive controllers vs. leap motion for interactions in virtual environments: a comparative evaluation
In recent years, virtual reality technologies have been improving in terms of resolution,
convenience and portability, fostering their adoption in real life applications. The Vive …
convenience and portability, fostering their adoption in real life applications. The Vive …
Model driven design and evaluation of security level in orchestrated cloud services
Cloud-based architectures, services and resources are growing up in complexity day by day.
Composition and Orchestration deal with the problem of creating complex services …
Composition and Orchestration deal with the problem of creating complex services …
A Hybrid Cloud Enterprise Strategic Management system
This paper is an attempt to address merging or existing and emerging systems with
enterprise strategy in mind that optimizes operational productivity based on different …
enterprise strategy in mind that optimizes operational productivity based on different …
LoDGP: a framework for support traffic information systems based on logic paradigm
Nowadays, many studies demonstrate that one of the main causes of traffic congestion is the
search for available parking lots. In this paper, we want to exploit the VANETs potentialities …
search for available parking lots. In this paper, we want to exploit the VANETs potentialities …
Detect and correlate information system events through verbose logging messages analysis
Detecting and tracking events from logging data is a critical element for security and system
administrators and thus attracts more and more research efforts. However, there exists a …
administrators and thus attracts more and more research efforts. However, there exists a …