Search
Now showing items 31-40 of 63
Preference-based semantic matching of web service security policies
(
IEEE
, 2013 , Conference Paper)
This electronic document is a live template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document. 2013 IEEE.
Attack Prediction Models for Cloud Intrusion Detection Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In spite of the functional and economic benefits of the cloud-computing systems, they also expose entirely several attacks. Most of the current cloud security technologies do not provide early warnings about such attacks. ...
A finite context intrusion prediction model for cloud systems with a probabilistic suffix tree
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
The success of the cloud computing paradigm depends on how effectively the cloud infrastructures will be able to instantiate and dynamically maintain computing platforms that meet Quality of Service (QoS) requirements. ...
Intrusion response systems for cyber-physical systems: A comprehensive survey
(
Elsevier
, 2023 , Article Review)
Cyberattacks on Cyber-Physical Systems (CPS) are on the rise due to CPS increased networked connectivity and may cause costly environmental hazards as well as human and financial loss. This necessitates designing and ...
Towards Proactive Fault Management of Enterprise Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper introduces a model-based approach for autonomic fault management of computing systems. The proposed approach can recover a system from common faults while minimizing the impact on the system's quality of service ...
Semantics-based approach for dynamic evolution of trust negotiation protocols in cloud collaboration
(
Springer Verlag
, 2014 , Conference Paper)
Many techniques for addressing trust negotiation issues is little concerned with managing the dynamic evolution of trust negotiation protocols (policies), particularly in cases where there exist ongoing negotiations when ...
Security oriented service composition: A framework
(
IEEE
, 2012 , Conference Paper)
This paper argues that in order to address the challenges of security compatibility checking between the client's software and the service software in a service oriented software environment, the followings have to be ...
A predictive control approach for fault management of computing systems
(
Association for Computing Machinery
, 2015 , Conference Paper)
In this paper, a model-based predictive control approach for fault management in computing systems is presented. The proposed approach can incorporate existing fault diagnosis methods and fault recovery actions to facilitate ...
Predictive Autoscaling of Microservices Hosted in Fog Microdata Center
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Fog computing provides microdata center (MDC) facilities closer to the users and applications, which help to overcome the application latency and response time concerns. However, guaranteeing specific service-level objectives ...
Towards automated hazard analysis for CPS security with application to CSTR system
(
Elsevier
, 2022 , Article)
Hazard analysis to identify risks due to cyber attacks is crucial to ensure cyber-physical systems' safety and correct their behavior. This study proposes a framework to analyze cyber-physical systems (CPS) risks using ...