default search action
6th CSCloud / 5th EdgeCom 2019: Paris, France
- Meikang Qiu:
6th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2019 / 5th IEEE International Conference on Edge Computing and Scalable Cloud, EdgeCom 2019, Paris, France, June 21-23, 2019. IEEE 2019, ISBN 978-1-7281-1661-7
CSCloud 1: Cloud Computing 1
- Tariqul Islam, Dakshnamoorthy Manivannan:
FaCS: Toward a Fault-Tolerant Cloud Scheduler Leveraging Long Short-Term Memory Network. 1-6 - Katarzyna Kapusta, Han Qiu, Gérard Memmi:
Reinforcing Protection Against Chosen-Plaintext Attack Using Ciphertext Fragmentation in Multi-cloud Environments. 7-9 - Hussein Al-Zoubi:
Efficient Task Scheduling for Applications on Clouds. 10-13 - Bruno Dzogovic, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot, Thanh Van Do:
Connecting Remote eNodeB with Containerized 5G C-RANs in OpenStack Cloud. 14-19
CSCloud 2: Cloud Computing 2
- Tudor Antohi:
Model for Cloud Migration Cost. 20-28 - Aatish Chiniah, Avinash Mungur:
Dynamic Erasure Coding Policy Allocation (DECPA) in Hadoop 3.0. 29-33
CSCloud 3: Cloud Computing 3
- Yuchia Tseng, Gopalasingham Aravinthan, Bela Berde, Sofiane Imadali, Drissa Houatra, Han Qiu:
Re-Think Monitoring Services for 5G Network: Challenges and Perspectives. 34-39 - Meng Ma, Jun Yang, Ping Wang, Weijie Liu, Jingzhuo Zhang:
Light-Weight and Scalable Hierarchical-MVC Architecture for Cloud Web Applications. 40-45 - Shirin Dabbaghi Varnosfaderani, Piotr Kasprzak, Christof Pohl, Ramin Yahyapour:
A Flexible and Compatible Model for Supporting Assurance Level through a Central Proxy. 46-52
CSCloud 4: Machine Learning
- Xinyu Gong, Yuefu Zhou, Yue Bi, Mingcheng He, Shiying Sheng, Han Qiu, Ruan He, Jialiang Lu:
Estimating Web Attack Detection via Model Uncertainty from Inaccurate Annotation. 53-58 - Naiji Zhang, Fehmi Jaafar, Yasir Malik:
Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine Learning. 59-62 - Tirath Prasad Sahu, Reswanth Sai Thummalapudi, Naresh Kumar Nagwani:
Automatic Question Tagging Using Multi-label Classification in Community Question Answering Sites. 63-68 - Vaibhav Singh, Kapil Sharma:
Empirical Analysis of Shallow and Deep Architecture Classifiers on Emotion Recognition from Speech. 69-73
CSCloud 5: Security on Cloud Computing 1
- Wenjun Fan, Joanna Ziembicka, Rogério de Lemos, David W. Chadwick, Francesco Di Cerbo, Ali Sajjad, Xiao-Si Wang, Ian Herwono:
Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud. 74-80 - Olusola Akinrolabu, Steve New, Andrew Martin:
Assessing the Security Risks of Multicloud SaaS Applications: A Real-World Case Study. 81-88 - Davide Bove, Tilo Müller:
Investigating Characteristics of Attacks on Public Cloud Systems. 89-94 - Abdullah Sheikh, Malcolm Munro, David Budgen:
Cost and Effect of Using Scheduling Security Model in a Cloud Environment. 95-101
CSCloud 6: Security on Cloud Computing 2
- Gustavo Jose Nieves Arreaza:
Methodology for Developing Secure Apps in the Clouds. (MDSAC) for IEEECS Confererences. 102-106 - Brian Krisler, Partha Pratim Pal, Zech Bertilson, Dan Thomsen:
Secure Desktop Computing in the Cloud. 107-112 - Ralph Koning, Gleb Polevoy, Lydia Meijer, Cees de Laat, Paola Grosso:
Approaches for Collaborative Security Defences in Multi Network Environments. 113-123
CSCloud 7: System Security 1
- Samy Kambou, Ahmed Bouabdallah:
A Strong Authentication Method for Web/Mobile Services. 124-129 - Bernardo de Matos Patrocínio dos Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do:
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks. 130-135 - JiaYou Chen, Hong Guo, Wei Hu:
Research on Improving Network Security of Embedded System. 136-138 - Omar A. Abdulkader, Alwi M. Bamhdi, Vijey Thayananthan, Fathy Elbouraey, Bandar Al-Ghamdi:
A Lightweight Blockchain Based Cybersecurity for IoT environments. 139-144
CSCloud 8: System Security 2
- Miltiadis G. Siavvas, Erol Gelenbe:
Optimum Interval for Application-level Checkpoints. 145-150 - Wei-Chi Ku, Hao-Jun Xu:
Efficient Shoulder Surfing Resistant PIN Authentication Scheme Based on Localized Tactile Feedback. 151-156 - Wenting Li, Ping Wang:
Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing. 157-162
CSCloud 9: System Security 3
- Yalda Khosroshahi, Enver Ozdemir:
Detection of Sources Being Used in DDoS Attacks. 163-168 - Asaf Algawi, Michael Kiperberg, Roee Leon, Amit Resh, Nezer Jacob Zaidenberg:
Efficient Protection for VDI Workstations. 169-172 - Fatma Mallouli, Aya Hellal, Nahla Sharief Saeed, Fatimah Abdulraheem Alzahrani:
A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms. 173-176
EdgeCom 1
- Roonak Rezvani, Shirin Enshaeifar, Payam M. Barnaghi:
Lagrangian-Based Pattern Extraction for Edge Computing in the Internet of Things. 177-182 - Alejandro Santoyo-González, Cristina Cervelló-Pastor:
Edge Computing Node Placement in 5G Networks: A Latency and Reliability Constrained Framework. 183-189 - Somdip Dey, Amit Kumar Singh, Xiaohang Wang, Klaus Dieter McDonald-Maier:
DeadPool: Performance Deadline Based Frequency Pooling and Thermal Management Agent in DVFS Enabled MPSoCs. 190-195 - Francescomaria Faticanti, Francesco De Pellegrini, Domenico Siracusa, Daniele Santoro, Silvio Cretti:
Cutting Throughput with the Edge: App-Aware Placement in Fog Computing. 196-203
EdgeCom 2
- Angelo Liguori, Peter Schoo, Marcel Winandy:
Mind the Shift: Secure Migration of Containerized Processes in Edge Computing. 204-209 - Somdip Dey, Amit Kumar Singh, Sangeet Saha, Xiaohang Wang, Klaus Dieter McDonald-Maier:
RewardProfiler: A Reward Based Design Space Profiler on DVFS Enabled MPSoCs. 210-220 - Jia Qian, Sarada Prasad Gochhayat, Lars Kai Hansen:
Distributed Active Learning Strategies on Edge Computing. 221-226 - Nuwan Jayawardene, Pumudu Fernando:
A Review of Fog Network Implementations in Current IoT Products. 227-232
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.