Search
Now showing items 3431-3440 of 3918
EasyCapstone: A framework for managing and assessing capstone design projects
(
IEEE
, 2012 , Conference Paper)
To enhance students learning and satisfy ABET requirements, the Department of Computer Science and Engineering at Qatar University undertook over the past few years significant enhancements to the senior design project ...
Addressing security compatibility for multi-tenant cloud services
(
Inderscience Publishers
, 2013 , Article)
This paper addresses the issue of compatibility checking between the security requirements of service clients and the security assurances provided by multi-tenant cloud services. To allow early detection of security ...
A model-based approach to self-protection in computing system
(
Association for Computing Machinery, Inc
, 2013 , Conference Paper)
This paper introduces a model-based autonomic security management (ASM) approach to estimate, detect and identify security attacks along with planning a sequence of actions to effectively protect the networked computing ...
Modeling security importance and preferences of software services
(
IEEE
, 2012 , Conference Paper)
This paper proposes a modeling framework on how to specify security preferences and importance of software services, and compute a quantifiable value. Our approach advocates for an automatic calculation of the results of ...
A Modified Layer of Protection Analysis for Cyber-Physical Systems Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Layer of Protection Analysis (LOPA) is the most commonly used approach for quantitative safety risk assessment in the process control industry to protect a Cyber- Physical System (CPS) from accidental hazards-causing ...
Social-sensor cloud service for scene reconstruction
(
Springer Verlag
, 2017 , Conference Paper)
We propose a new social-sensor cloud services selection framework for scene reconstruction. The proposed research represents social media data streams, i.e., images' metadata and related posted information, as social sensor ...
Probabilistic qualitative preference matching in long-term IaaS composition
(
Springer Verlag
, 2017 , Conference Paper)
We propose a qualitative similarity measure approach to select an optimal set of probabilistic Infrastructure-as-a-Service (IaaS) requests according to the provider's probabilistic preferences over a long-term period. The ...
Mobile crowdsourced sensors selection for journey services
(
Springer Verlag
, 2018 , Conference Paper)
We propose a mobile crowdsourced sensors selection approach to improve the journey planning service especially in areas where no wireless or vehicular sensors are available. We develop a location estimation model of journey ...
An autonomic detection and protection system for denial of service attack
(
ACTA Press
, 2012 , Conference Paper)
This paper introduces a self-protection structure for computing system. The proposed structure aims to detect, classify and protect against DoS attacks. This architecture utilizes a model-based decision approach that ...
Reasoning about security policies of services using answer set programming
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ...