From security to assurance in the cloud: A survey

CA Ardagna, R Asal, E Damiani, QH Vu - ACM Computing Surveys …, 2015 - dl.acm.org
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …

Federated cloud resource management: Review and discussion

M Liaqat, V Chang, A Gani, SH Ab Hamid… - Journal of Network and …, 2017 - Elsevier
Federation of clouds is the future of cloud computing, mobile cloud computing, Internet of
things, and big data applications. The utilization of federated resources is envisioned to …

Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges

R Roman, J Lopez, M Mambo - Future Generation Computer Systems, 2018 - Elsevier
For various reasons, the cloud computing paradigm is unable to meet certain requirements
(eg low latency and jitter, context awareness, mobility support) that are crucial for several …

Optimizing top precision performance measure of content-based image retrieval by learning similarity function

RZ Liang, L Shi, H Wang, J Meng… - 2016 23rd …, 2016 - ieeexplore.ieee.org
In this paper we study the problem of content-based image retrieval. In this problem, the
most popular performance measure is the top precision measure, and the most important …

Cybersecurity dynamics: A foundation for the science of cybersecurity

S Xu - Proactive and dynamic network defense, 2019 - Springer
Cybersecurity Dynamics is new concept that aims to achieve the modeling, analysis,
quantification, and management of cybersecurity from a holistic perspective, rather than from …

Security and privacy issues and solutions for fog

M Mukherjee, MA Ferrag, L Maglaras… - Fog and fogonomics …, 2020 - Wiley Online Library
This chapter presents an overview of the primary security and privacy issues in fog
computing. It discusses the state‐of‐the‐art solutions that deal with fog computing‐related …

A novel transfer learning method based on common space map** and weighted domain matching

RZ Liang, W **e, W Li, H Wang… - 2016 IEEE 28th …, 2016 - ieeexplore.ieee.org
In this paper, we propose a novel learning framework for the problem of domain transfer
learning. We map the data of two domains to one single common space, and learn a …

A comprehensive review of distributed denial of service (DDoS) attacks in fog computing environment

B Paharia, K Bhushan - Handbook of Computer Networks and Cyber …, 2020 - Springer
Cloud computing performs several functionalities, and one of the most important
functionalities is the storage and processing of data or information. With day-by-day …

Fog and fogonomics: challenges and practices of fog computing, communication, networking, strategy, and economics

Y Yang, J Huang, T Zhang, J Weinman - 2020 - books.google.com
THE ONE-STOP RESOURCE FOR ANY INDIVIDUAL OR ORGANIZATION CONSIDERING
FOG COMPUTING Fog and Fogonomics is a comprehensive and technology-centric …

Nodal authentication of IoT data using blockchain

BT Asare, K Quist–Aphetsi… - … international conference on …, 2019 - ieeexplore.ieee.org
Pervasive systems over the years continuous to grow exponentially. Engagement of IoT in
fields such as Agriculture, Home automation, industrial applications etc is on the rise. Self …