Integration of networking, caching, and computing in wireless systems: A survey, some research issues, and challenges
Since the recently emerging mobile applications have posed significant demands not only
on high data rate but also on high caching and computing capabilities, the growth in …
on high data rate but also on high caching and computing capabilities, the growth in …
An AI-driven VM threat prediction model for multi-risks analysis-based cloud cybersecurity
Cloud virtualization technology, ingrained with physical resource sharing, prompts
cybersecurity threats on users' virtual machines (VMs) due to the presence of inevitable …
cybersecurity threats on users' virtual machines (VMs) due to the presence of inevitable …
Amplifying side channels through performance degradation
Interference between processes executing on shared hardware can be used to mount
performance-degradation attacks. However, in most cases, such attacks offer little benefit for …
performance-degradation attacks. However, in most cases, such attacks offer little benefit for …
A survey of security and privacy challenges in cloud computing: solutions and future directions
While cloud computing is gaining popularity, diverse security and privacy issues are
emerging that hinder the rapid adoption of this new computing paradigm. And the …
emerging that hinder the rapid adoption of this new computing paradigm. And the …
Scale inside-out: Rapid mitigation of cloud DDoS attacks
The distributed denial of service (DDoS) attacks in cloud computing requires quick
absorption of attack data. DDoS attack mitigation is usually achieved by dynamically scaling …
absorption of attack data. DDoS attack mitigation is usually achieved by dynamically scaling …
DDoS attacks in cloud computing: Collateral damage to non-targets
The effects of distributed denial-of-service (DDoS) attacks on cloud computing are not very
similar to those in traditional “fixed” on-premise infrastructure. In the context of DDoS attacks …
similar to those in traditional “fixed” on-premise infrastructure. In the context of DDoS attacks …
Novel denial-of-service attacks against cloud-based multi-robot systems
The development of robotics technology is accelerated by the strong support from cloud
computing. Massive computation resources and services from the cloud make modern multi …
computing. Massive computation resources and services from the cloud make modern multi …
Automated side channel analysis of media software with manifold learning
The prosperous development of cloud computing and machine learning as a service has led
to the widespread use of media software to process confidential media data. This paper …
to the widespread use of media software to process confidential media data. This paper …
Cloud FPGA cartography using PCIe contention
Public cloud infrastructures allow for easy, on-demand access to FPGA resources. However,
the low-level, direct access to the FPGA hardware exposes the infrastructure providers to …
the low-level, direct access to the FPGA hardware exposes the infrastructure providers to …
Joint optimization of VNF placement and flow scheduling in mobile core network
As the development of new generation mobile communication technology, the mobile core
network also needs to be upgraded by new network technologies, eg, software defined …
network also needs to be upgraded by new network technologies, eg, software defined …