Computer Science & Engineering: Recent submissions
Now showing items 601-620 of 2402
-
Attack Prediction Models for Cloud Intrusion Detection Systems
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)In spite of the functional and economic benefits of the cloud-computing systems, they also expose entirely several attacks. Most of the current cloud security technologies do not provide early warnings about such attacks. ... -
QoS optimization for cloud service composition based on economic model
( Springer Verlag , 2015 , Conference Paper)Cloud service composition is usually long term based and economically driven. Services in cloud computing can be categorized into two groups: Application services and Computing Services. Compositions in the application ... -
A hierarchical, autonomous, and forecasting cloud IDS
( IEEE , 2013 , Conference Paper)Cloud computing supports distributed service oriented paradigm, multi-domain and multi-users administrative infrastructure. Due to the distributed nature of the cloud environment, it has high intrusion prospects and suspect ... -
HA-CIDS: A hierarchical and autonomous IDS for cloud systems
( IEEE , 2013 , Conference Paper)Cloud computing is an attractive model that provides the delivery of on-demand computing resources over the Internet and on a pay-for-use basis. However, while intruders may exploit clouds for their advantage, most IDS ... -
Security oriented service composition: A framework
( IEEE , 2012 , Conference Paper)This paper argues that in order to address the challenges of security compatibility checking between the client's software and the service software in a service oriented software environment, the followings have to be ... -
Detecting deception attacks in cyber-physical linear parameter varying systems with packet loss
( John Wiley and Sons Ltd , 2023 , Article)The increased connectivity of cyber-physical systems (CPS) to enterprise networks raises challenging security concerns. Detecting attacks on CPS is a vital step to improving their security. Most of the existing attack ... -
Canny edge detection and Hough transform for high resolution video streams using Hadoop and Spark
( Springer , 2020 , Article)Nowadays, video cameras are increasingly used for surveillance, monitoring, and activity recording. These cameras generate high resolution image and video data at large scale. Processing such large scale video streams to ... -
Towards automated hazard analysis for CPS security with application to CSTR system
( Elsevier , 2022 , Article)Hazard analysis to identify risks due to cyber attacks is crucial to ensure cyber-physical systems' safety and correct their behavior. This study proposes a framework to analyze cyber-physical systems (CPS) risks using ... -
LingoSnacks: M-Learning platform for language learning
( IEEE , 2012 , Conference Paper)This paper reports the experience of designing and developing a multimedia m-Learning platform (named LingoSnacks) for interactive learning of Arabic spelling and vocabulary. It uses interactive game-like delivery methods ... -
Towards Proactive Fault Management of Enterprise Systems
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)This paper introduces a model-based approach for autonomic fault management of computing systems. The proposed approach can recover a system from common faults while minimizing the impact on the system's quality of service ... -
Addressing security compatibility for multi-tenant cloud services
( Inderscience Publishers , 2013 , Article)This paper addresses the issue of compatibility checking between the security requirements of service clients and the security assurances provided by multi-tenant cloud services. To allow early detection of security ... -
A predictive control approach for fault management of computing systems
( Association for Computing Machinery , 2015 , Conference Paper)In this paper, a model-based predictive control approach for fault management in computing systems is presented. The proposed approach can incorporate existing fault diagnosis methods and fault recovery actions to facilitate ... -
Modeling security importance and preferences of software services
( IEEE , 2012 , Conference Paper)This paper proposes a modeling framework on how to specify security preferences and importance of software services, and compute a quantifiable value. Our approach advocates for an automatic calculation of the results of ... -
Diminishing Returns and Deep Learning for Adaptive CPU Resource Allocation of Containers
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Containers provide a lightweight runtime environment for microservices applications while enabling better server utilization. Automatic optimal allocation of CPU pins to the containers serving specific workloads can help ... -
Predictive Autoscaling of Microservices Hosted in Fog Microdata Center
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Fog computing provides microdata center (MDC) facilities closer to the users and applications, which help to overcome the application latency and response time concerns. However, guaranteeing specific service-level objectives ... -
Web service cost optimization
( Association for Computing Machinery, Inc , 2015 , Conference Paper)Cloud computing has become a major building block for Web applications where the service providers provide the costumers with Web services performing certain tasks so the system developers can use these services instead ... -
Preference-based semantic matching of web service security policies
( IEEE , 2013 , Conference Paper)This electronic document is a live template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document. 2013 IEEE. -
Web Application Resource Requirements Estimation Based on the Workload Latent Features
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Most cloud computing platforms offer reactive resource auto-scaling mechanisms for dealing with variable traffic patterns to deliver the desired QoS properties while keeping low provisioning costs. However, a range of ... -
Intrusion response systems for cyber-physical systems: A comprehensive survey
( Elsevier , 2023 , Article Review)Cyberattacks on Cyber-Physical Systems (CPS) are on the rise due to CPS increased networked connectivity and may cause costly environmental hazards as well as human and financial loss. This necessitates designing and ... -
EasyCapstone: A framework for managing and assessing capstone design projects
( IEEE , 2012 , Conference Paper)To enhance students learning and satisfy ABET requirements, the Department of Computer Science and Engineering at Qatar University undertook over the past few years significant enhancements to the senior design project ...