Search Results - "Cloud computing"

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Green, pervasive, and cloud computing : 12th International Conference, GPC 2017, Cetara, Italy, May 11-14, 2017, Proceedings by GPC (Conference) Cetara, Italy), SpringerLink (Online service)

    Published: Springer, 2017
    Description: 1 online resource (xx, 815 pages) : illustrations.
    Contents: “…Security issues in cloud computing /…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  2. 2

    Contemporary digital forensic investigations of cloud and mobile applications by ScienceDirect (Online service)

    Published: Syngress, 2017
    Description: 1 online resource.
    Subjects:
    Elsevier - Click here for access
    eBook
  3. 3

    Cloud Storage Forensics by Quick, Darren, Martini, Ben, 1990-, Choo, Kim-Kwang Raymond

    Published: Elsevier/Syngress, 2014
    Description: 1 online resource (189 pages)
    Subjects:
    Elsevier - Click here for access
    eBook
  4. 4

    Pervasive Systems, Algorithms and Networks : 16th International Symposium, I-SPAN 2019, Naples, Italy, September 16-20, 2019, Proceedings by International Symposium on Pervasive Systems, Algorithms, and Networks Naples, Italy, SpringerLink (Online service)

    Published: Springer, 2019
    Description: 1 online resource (398 pages).
    Contents: “…Containers scheduling consolidation approach for cloud computing /…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  5. 5

    Advanced multimedia and ubiquitous engineering : MUE/FutureTech 2017 by FutureTech (Conference) Seoul, Korea), SpringerLink (Online service)

    Published: Springer, 2017
    Description: 1 online resource (xxx, 740 pages) : illustrations.
    Contents: “…3.6 Visualisation4 Simulations; 4.1 Case 1; 4.2 Case 2; 5 Conclusions; References; Advanced Data Communication Framework for Cloud Computing from CDMI; Abstract; 1 Introduction; 2 Cloud Storage and Data; 3 Cloud Computing Based Data Management Structure; 3.1 Data Processing in the Existing Cloud Computing; 3.2 CDMI Framework Proposal; 4 Evaluation; 5 Conclusion; References; A Study of AI Based E-learning System and Application; Abstract; 1 Introduction; 2 Relevant Previous Studies; 3 Research Methods and Procedures; 3.1 Research Panel Configuration; 3.2 Data Processing; 4 Results and Analysis.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  6. 6

    Security, privacy, and anonymity in computation, communication, and storage : 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings by SpaCCS (Conference) Guangzhou, China), SpringerLink (Online service)

    Published: Springer, 2017
    Description: 1 online resource (xviii, 610 pages) : illustrations.
    Contents: “…Optimized Analysis Based on Improved Mutation and Crossover Operator for Differential Evolution Algorithm -- Revisiting Localization Attacks in Mobile App People-Nearby Services -- Lengthening Unidimensional Continuous-variable Quantum Key Distribution with Noiseless Linear Amplifier -- Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext -- An Attack to an Anonymous Certi cateless Group Key Agreement Scheme and its Improvement -- A Space Effcient Algorithm for LCIS Problem -- Improving the Efficiency of Dynamic Programming in Big Data Computing -- Traceable and Complete Fine-Grained Revocable Multi-Authority Attribute-Based Encryption Scheme in Social Network -- The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android -- An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow -- An Improved Pre-Copy Transmission Algorithm in Mobile Cloud Computing -- Motivation of DDOS Attack-Aware Link Assignment between Switches to SDN Controllers -- TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing -- Personalized Semantic Location Privacy Preservation Algorithm Based on Query Processing Cost Optimization -- Smartphone Bloatware: An Overlooked Privacy Problem -- An ECC-Based off-line Anonymous Grouping-proof Protocol -- PCSD: A Tool for Android Malware Detection -- Authorship Analysis of Social Media Contents Using Tone and Personality Features -- Privacy-Preserving Handover Authentication Protocol from Lightweight Identity-Based Signature for Wireless Networks -- Spatial Outlier Information Hiding Algorithm Based on Complex Transformation -- A Reputation Model Considering Repurchase Behavior and Mechanism Design to Promote Repurchase -- Chinese Named Entity Recognition Based on B-LSTM Neural Network with Additional Features -- Amplified Locality-Sensitive Hashing for Privacypreserving Distributed Service Recommendation -- Learn to Accelerate Identifying New Test Cases in Fuzzing -- Service Selection Based on User Privacy Risk Evaluation -- An Efficient Lattice-Based Proxy Signature with Message Recovery -- FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism -- Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption -- Relacha: Using Associative Meaning for Image Captcha Understandability -- Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces -- A Formal Android Permission Model Based on the B Method -- S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks -- MCloud: Efficient Monitoring Framework for Cloud Computing Platforms -- Secure Vibration Control of Flexible Arms based on Operators' Behaviors -- A New Color Image Encryption Scheme Based on Chaotic Hn Map and Lstem -- A Distributed Authentication Protocol using Identity-based Encryption and Blockchain for LEO Network -- A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation -- A Unified Model for Detecting Privacy Leakage on Android -- Multi-party Security Computation with Differential Privacy Over Outsourced Data -- REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies -- Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection -- Privacy Preserving Hierarchical Clustering over Multi-Party Data Distribution -- Improving MQTT by Inclusion of Usage Control -- Using JSON to Specify Privacy Preserving-enabled Attribute-based Access Control Policies -- Comprehensive Diversity in Recommender Systems -- Towards Intelligent System Wide Information Management for Air Traffic Management -- A Security Risk Management Model for Cloud Computing Systems: Infrastructure As A Service.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  7. 7
  8. 8

    Ubiquitous security : Second International Conference, UBISEC 2022, Zhangjiajie, China, December 28-31, 2022 by International Conference on Ubiquitous Security Zhangjiajie, China, SpringerLink (Online service)

    Published: Springer, 2023
    Description: 1 online resource (543 pages).
    Contents: “…Cyberspace Security -- Support Tool Selection in Digital Forensics Training -- Listen to the Music: Evaluating the Use of Music in Audio Based Authentication -- A Hybrid Secure Two-party Protocol for Vertical Federated Learning -- Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label lassification Model Using CNN-BiLSTM -- CATS: A serious game in industry towards stronger cloud security -- Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing -- System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection -- Vulnerability Detection with Representation Learning -- Assessing Vulnerability from Its Description -- Malware Traffic Classification Based on GAN and BP Neural Networks -- Source Code Vulnerability Detection using Deep Learning Algorithms for Industrial Applications -- Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning -- Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study -- An Aspect-Based Semi-Supervised Generative Model for Online Review Spam Detection -- Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning -- Improved DeepLabV3+ based Railway track extraction to Enhance Railway Transportation Safety -- Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA) -- Android Malware Detection: A Literature Review -- Threat Modeling in Cloud Computing - A Literature Review -- A New Signal Packing Algorithm for CAN-FD with Security Consideration -- An Adversarial Sample Defense Method based on Saliency Information -- BlockLearning: A Modular Framework for Blockchain-based Vertical Federated Learning -- Cyberspace Privacy -- An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis -- Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing -- Encryption Proxies in a Confidential Computing Environment -- FedTA:Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization -- Differentially Private Clustering Algorithm for Mixed Data -- Impact Of Reenactment Programs on Young Generation -- Sensor Cloud Data Privacy Protection Model Based On Collaborative Deep Learning -- Cyberspace Anonymity -- An Improved Cuckoo Search Algorithm and Its Application in Function Optimization -- Empirical Likelihood for PLSIM with Missing Response Variables and Error-prone Covariates -- High-speed Anonymous Device Authentication without Asymmetric Cryptography in the Internet-of-Things -- A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud -- A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-based Applications in Cyber-Physical Systems -- Short Papers -- Garbage recognition algorithm based on self-attention mechanism and deep sorting -- Approaches for Zero Trust Adoption Based Upon Organization Security Level -- Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network -- On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  9. 9

    Ubiquitous security : first International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised selected papers by International Conference on Ubiquitous Security Guangzhou, China, SpringerLink (Online service)

    Published: Springer, 2022
    Description: 1 online resource (xvii, 380 pages) : illustrations (some color).
    Contents: “…A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN -- Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks -- Towards a Two-tier Architecture for Privacy-enabled Recommender Systems (PeRS) -- A Supervised Rare Anomaly Detection Technique via Cooperative Co-Evolution-Based Feature Selection using Benchmark UNSW_NB15 Dataset -- Towards Evaluating the Effectiveness of Botnet Detection Techniques -- A Robust Malware Detection Approach for Android System based on Ensemble Learning -- A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals -- A Fine-tuning Strategy Based on Real Scenes in Gait Identification An Online Automated Anti-Anti-Virus Method -- Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment -- An Edge-Cloud Collaborative Object Detection System.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  10. 10

    Handbook of big data and IoT security by SpringerLink (Online service)

    Published: Springer, 2019
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  11. 11

    International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 : Applications and Techniques in Cyber Security and Intelligence by International Conference on Applications and Techniques in Cyber Security and Intelligence Shanghai, China, SpringerLink (Online service)

    Published: Springer, 2019
    Description: 1 online resource (1387 pages).
    Contents: “…Convolutional Neural Network Deep-Learning Models for Prediction of Shared Bicycle Demand -- Analysis of Feature Selection Techniques for Correlation-Based Network Anomaly Detection -- An RFID Path Authentication Protocol Based on Chebyshev Polynomials -- An Efficient Authentication Protocol for RFID-based Supply Chains -- Research on the Two Stage Full Life Cycle Management of Police Equipment -- Research on Audio and Video Transmission Strategy for Android -- Emojis Sentiment Analysis Based on Big Social Media Data -- A Transfer Learning Approach for Credit Scoring -- A Parallel Programming Model Research Based on Heterogeneous Multi-core Embedded Processor -- An Improved Apriori-Pro Algorithm -- An Improved Fuzzy Support Vector Machine Algorithm Based on Refactoring Class Center -- An Ensemble Data Stream Mining Algorithm for Class-imbalanced Applications -- A Gaussian-Based Trust Model for Nodes of Sensor Networks -- A Study of Face Recognition System's Testing and Evaluation Methods -- Network Security Problems and Solutions of Video Surveillance System -- Image Encryption Algorithms Based on Chaos Through Dual Scrambling of Dynamic Josephus Ring and Bit -- Statistical Analysis of Traffic-related Social Media Data of Multiple Cities in China -- Exploring Influential Factors in Recommending Algorithms for All Items and Niche Items -- A Distributed Approach of Accompany Vehicle Discovery -- Spatial Context for Correlation Filter Tracking -- The Automobile Recommendation Method Based on Sentiment Analysis of Online Comments -- An Adaptive Tracking Algorithm for Micro-Blog Topic based on Association Semantic Network -- Knowledge Extracting from Micro-Blog Topic -- Personal Relations Extraction from Microblog Text Based on Relations Trigger Words -- Recommendation Algorithm Based on Latent Semantic of Tags -- Ontology-supported Case-based Reasoning Approach for Double Scenario Model Construction in International Disaster Medical Relief Action -- Web Sanitization from Malicious Code Injection Attacks -- Event Element Recognition Based on Improved K-means Algorithm -- A Comparative Method of Legal Documents Based on LDA -- Feature Selection Approach for Twitter Sentiment Analysis and Text classification Based on Chi-square and Naïve Bayes -- A Combined Approach of Long Term Spectral Flatness and Formant Based Voice Activity Detection -- Design and Development of Automatic Packaging Equipment for Boxed Drugs -- Development of Automatic Material Sorting Machine Based on PLC -- Intelligent Counter-terrorism Equipment Status and Development -- A Monitoring System of Ground-Air Interaction Multi-Sensory Fusion Plant Growth Condition -- RSCHE: A Virtual Grid Structure Based Routing Scheme with Cell-Header Group Exchanged for Wireless Sensor Network -- A Improved Person Reidentification Method by Selective Convolutional Descriptor Aggregation -- A Survey of Multi-object Video Tracking Algorithms -- An Overview of Image-based Person Re-identification -- Electrical Data Recovery with Weather Information via Collective Matrix Factorization -- Two-Phases Detection Scheme: Detecting Android Malware in Android Markets -- A Software Quality Testing Evaluation Method and its Power Grid Application -- An Index Display Software Evaluation Architecture for Power Grid Application on Big Data Platform -- A Unified Access Method of Heterogeneous Big Data in Power Grid Application -- Regional Power Grid dispatch and Control Integrated Backup System Based on Cloud Computing -- Detection of Anomaly in Firewall Rule-Sets -- Classification and Coding of Pipe Gallery BIM Model for Operation and Maintenance -- A UAV Operational Situation Similarity Measurement Method Based on Empirical Mode Decomposition -- Research on Parking Guidance Information System Based on "Internet Plus" -- Dynamic Multi-objective Optimization for Mixed Traffic Flow Based on Partial Least Squares Prediction Model -- Multi-objective Genetic Algorithm BasedPrefabricated Component Production Process Optimization Considering the Demand Fluctuations in the Construction Site -- Anomaly Detection in Time Series Data Based on Unthresholded Recurrence Plots -- A Two-stage Temporal Anomaly Detection Algorithm Based on Danger Theory -- A Data-driven Framework for Tunnel Infrastructure Maintenance -- A Heuristic for Legacy Information System Remodularization -- E-maintenance Platform Design for Public Infrastructure based on IFC and Semantic Web Technologies -- Building and Application of Shield Construction Big Data Analysis Platform -- A Professional Competence Measurement Approach Based on a Modified PageRank Algorithm -- Particle-Filter-based Prediction for Anomaly Detection -- Analysis on Building a Green Eco-smart City Based on Block Chain Technology -- 3D Indoor Network Model for Emergency Response of Multi-utility Tunnel -- Computer Data Integration Analysis of the Personal Credit Reporting System -- Digital Image Encryption Algorithm Based on Affine Cipher -- Research on the Evaluation Methods of the Guidance and Test on the Student Employment Based on the Computer Model -- Research on the Ideological and Political Assessment System Based on the Data Visualization -- Research on the Interaction Mechanism Between the Ideological and Political Education and the Computer Network Under the New Media Environment -- Research on the Key Technology of the Computer Graphics and Image Processing -- Research on the Security Management Information System Based on the Data Mining.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  12. 12

    Security, privacy, and anonymity in computation, communication, and storage : SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings by SpaCCS (Conference) Guangzhou, China), SpringerLink (Online service)

    Published: Springer, 2017
    Description: 1 online resource (xviii, 610 pages) : illustrations.
    Contents: “…-Password Recovery for ZIP Files Based on ARM-FPGA Cluster -- Comparison of Different Centrality Measures to Find Influential Nodes in Complex Networks -- An FPGA-based Algorithm to Accelerate Regular Expression Matching -- A Collaborative Filtering Recommendation Algorithm Based on Score Classification -- FluteDB: An Efficient and Dependable Time-Series Database Storage Engine -- Attacks on the Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud -- Research on Coupling Reliability Problem in Sensor- Cloud System -- An On-demand Monitoring Approach for Cloud Computing Systems -- Security on "A Lightweight Authentication Scheme with User Untraceability" -- A Security Scheme of Big Data Identity for Cloud Environment -- A Compact Construction for Non-monotonic Online/Offline CP-ABE scheme -- RPS-TSM: A Robot Perception System Based on Temporal Semantic Map -- MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data -- The Art of Using Cross-Layer Design in Cognitive Radio Networks -- A Quality Model for Evaluating Encryption-as-a-Service -- Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement -- A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration -- Security and Attack Vector Analysis of IoT Devices -- Security Solution of RFID Card through Cryptography -- Grouping Users for Quick Recommendations of Text Documents based on Deep Neural Network -- Module-level Software Streaming Loading Model Based on Hypervisor -- The 3rd International Symposium on Sensor-Cloud Systems (SCS 2017) -- On-Street Car Parking Prediction in Smart City: A Multi-Source Data Analysis in Sensor-Cloud Environment -- A Weight-bind-based Safe Top-k Query Processing Scheme in Two-tiered Sensor Networks -- A Floorplanning Algorithm for Partially Reconfigurable FPGA in Wireless Sensor Network -- CO-TDMA: a TDMA Protocol for Collecting Data and OAP at the Same Time -- Cloud-assisted Data Storage and Query Processing at Vehicular Ad-hoc Sensor Networks -- EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNs -- The 2nd International Workshop on Cloud Storage Service and Computing (WCSSC 2017) -- Fast Truss Decomposition in Memory -- Pyramid:Revisiting Memory Extension with Remote Accessible Non-Volatile Main Memory -- Fully Decentralized Multi-Authority ABE Scheme in Data Sharing System -- Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix -- Research on Graph Processing Systems on a Single Machine -- 3D Model Reconstruction with Sequence Image of Aircraft -- Construction Research on Information Platform for Small and Medium-sized Enterprises Based on Cloud Storage Technology -- XoT: A Flexible Block I/O Data Transfer Protocol for Xen -- The First International Symposium on Multimedia Security and Digital Forensics (MSDF 2017) -- Detecting Spliced Face using Texture Analysis -- Fine-grained, Multi-key Search Control in Multi-user Searchable Encryption -- Overview of Performance Evaluation of Keyword Search Utilities in Forensic/E-Discovery Software -- The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity (SPBD 2017) -- Distribution Network Topology Reconstruction Method Based on Lasso and Its Supplementary Criterions.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook