Search
Now showing items 611-620 of 752
Modeling security importance and preferences of software services
(
IEEE
, 2012 , Conference Paper)
This paper proposes a modeling framework on how to specify security preferences and importance of software services, and compute a quantifiable value. Our approach advocates for an automatic calculation of the results of ...
A Modified Layer of Protection Analysis for Cyber-Physical Systems Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Layer of Protection Analysis (LOPA) is the most commonly used approach for quantitative safety risk assessment in the process control industry to protect a Cyber- Physical System (CPS) from accidental hazards-causing ...
Social-sensor cloud service for scene reconstruction
(
Springer Verlag
, 2017 , Conference Paper)
We propose a new social-sensor cloud services selection framework for scene reconstruction. The proposed research represents social media data streams, i.e., images' metadata and related posted information, as social sensor ...
Probabilistic qualitative preference matching in long-term IaaS composition
(
Springer Verlag
, 2017 , Conference Paper)
We propose a qualitative similarity measure approach to select an optimal set of probabilistic Infrastructure-as-a-Service (IaaS) requests according to the provider's probabilistic preferences over a long-term period. The ...
Mobile crowdsourced sensors selection for journey services
(
Springer Verlag
, 2018 , Conference Paper)
We propose a mobile crowdsourced sensors selection approach to improve the journey planning service especially in areas where no wireless or vehicular sensors are available. We develop a location estimation model of journey ...
An autonomic detection and protection system for denial of service attack
(
ACTA Press
, 2012 , Conference Paper)
This paper introduces a self-protection structure for computing system. The proposed structure aims to detect, classify and protect against DoS attacks. This architecture utilizes a model-based decision approach that ...
Reasoning about security policies of services using answer set programming
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ...
Practical and secure outsourcing of matrix computations to the cloud
(
IEEE
, 2013 , Conference Paper)
Cloud computing enables a cost effective outsourcing of storage and resource-intensive computations. Secure outsourcing of data and computation is challenging in this emerging computing model. In particular, outsourcing ...
Towards model-based management of database fragmentation
(
USENIX Association
, 2013 , Conference Paper)
The performance of a database can significantly deteriorate due to the fragmentation of data/index files. Manual database defragmentation and performance optimization remain time consuming and even infeasible as it requires ...
A Bilingual Scene-To-Speech Mobile Based Application
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Scene-To-Speech (STS) is the process of recognizing visual objects in a picture or a video to say aloud a descriptive text that represents the scene. The recent advancement in convolution neural network (CNN), a deep ...