Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …

Workload characterization: A survey revisited

MC Calzarossa, L Massari, D Tessera - ACM Computing Surveys (CSUR …, 2016 - dl.acm.org
Workload characterization is a well-established discipline that plays a key role in many
performance engineering studies. The large-scale social behavior inherent in the …

[หนังสือ][B] Big data, little data, no data: Scholarship in the networked world

CL Borgman - 2017 - books.google.com
An examination of the uses of data within a changing knowledge infrastructure, offering
analysis and case studies from the sciences, social sciences, and humanities.“Big Data” is …

A comprehensive study of the past, present, and future of data deduplication

W **a, H Jiang, D Feng, F Douglis… - Proceedings of the …, 2016 - ieeexplore.ieee.org
Data deduplication, an efficient approach to data reduction, has gained increasing attention
and popularity in large-scale storage systems due to the explosive growth of digital data. It …

Quality-of-service in cloud computing: modeling techniques and their applications

D Ardagna, G Casale, M Ciavotta, JF Pérez… - Journal of internet …, 2014 - Springer
Recent years have seen the massive migration of enterprise applications to the cloud. One
of the challenges posed by cloud applications is Quality-of-Service (QoS) management …

Temporal action localization by structured maximal sums

Z Yuan, JC Stroud, T Lu, J Deng - Proceedings of the IEEE …, 2017 - openaccess.thecvf.com
We address the problem of temporal action localization in videos. We pose action
localization as a structured prediction over arbitrary-length temporal windows, where each …

Secure data integrity check based on verified public key encryption with equality test for multi-cloud storage

W Li, W Susilo, C **a, L Huang, F Guo… - IEEE transactions on …, 2024 - ieeexplore.ieee.org
Cloud computing eliminates the need for local hardware, addressing the challenge of high
computing expenses. However, entrusting data to the cloud may pose the risk of …

Markov chain fingerprinting to classify encrypted traffic

M Korczyński, A Duda - IEEE INFOCOM 2014-IEEE conference …, 2014 - ieeexplore.ieee.org
In this paper, we propose stochastic fingerprints for application traffic flows conveyed in
Secure Socket Layer/Transport Layer Security (SSL/TLS) sessions. The fingerprints are …

[HTML][HTML] System security assurance: A systematic literature review

A Shukla, B Katt, LO Nweke, PK Yeng… - Computer Science …, 2022 - Elsevier
Abstract System security assurance provides the confidence that security features, practices,
procedures, and architecture of software systems mediate and enforce the security policy …

Forkbase: An efficient storage engine for blockchain and forkable applications

S Wang, TTA Dinh, Q Lin, Z **e, M Zhang, Q Cai… - arxiv preprint arxiv …, 2018 - arxiv.org
Existing data storage systems offer a wide range of functionalities to accommodate an
equally diverse range of applications. However, new classes of applications have emerged …