Abstract is missing.
- FaCS: Toward a Fault-Tolerant Cloud Scheduler Leveraging Long Short-Term Memory NetworkTariqul Islam, Dakshnamoorthy Manivannan. 1-6 [doi]
- Reinforcing Protection Against Chosen-Plaintext Attack Using Ciphertext Fragmentation in Multi-cloud EnvironmentsKatarzyna Kapusta, Han Qiu, Gérard Memmi. 7-9 [doi]
- Efficient Task Scheduling for Applications on CloudsHussein Al-Zoubi. 10-13 [doi]
- Connecting Remote eNodeB with Containerized 5G C-RANs in OpenStack CloudBruno Dzogovic, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot, Thanh Van Do. 14-19 [doi]
- Model for Cloud Migration CostTudor Antohi. 20-28 [doi]
- Dynamic Erasure Coding Policy Allocation (DECPA) in Hadoop 3.0Aatish Chiniah, Avinash Mungur. 29-33 [doi]
- Re-Think Monitoring Services for 5G Network: Challenges and PerspectivesYuchia Tseng, Gopalasingham Aravinthan, Bela Berde, Sofiane Imadali, Drissa Houatra, Han Qiu. 34-39 [doi]
- Light-Weight and Scalable Hierarchical-MVC Architecture for Cloud Web ApplicationsMeng Ma, Jun Yang, Ping Wang, Weijie Liu, Jingzhuo Zhang. 40-45 [doi]
- A Flexible and Compatible Model for Supporting Assurance Level through a Central ProxyShirin Dabbaghi Varnosfaderani, Piotr Kasprzak, Christof Pohl, Ramin Yahyapour. 46-52 [doi]
- Estimating Web Attack Detection via Model Uncertainty from Inaccurate AnnotationXinyu Gong, Yuefu Zhou, Yue Bi, Mingcheng He, Shiying Sheng, Han Qiu, Ruan He, Jialiang Lu. 53-58 [doi]
- Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine LearningNaiji Zhang, Fehmi Jaafar, Yasir Malik. 59-62 [doi]
- Automatic Question Tagging Using Multi-label Classification in Community Question Answering SitesTirath Prasad Sahu, Reswanth Sai Thummalapudi, Naresh Kumar Nagwani. 63-68 [doi]
- Empirical Analysis of Shallow and Deep Architecture Classifiers on Emotion Recognition from SpeechVaibhav Singh, Kapil Sharma. 69-73 [doi]
- Enabling Privacy-Preserving Sharing of Cyber Threat Information in the CloudWenjun Fan, Joanna Ziembicka, Rogério de Lemos, David W. Chadwick, Francesco Di Cerbo, Ali Sajjad, Xiao-Si Wang, Ian Herwono. 74-80 [doi]
- Assessing the Security Risks of Multicloud SaaS Applications: A Real-World Case StudyOlusola Akinrolabu, Steve New, Andrew Martin 0002. 81-88 [doi]
- Investigating Characteristics of Attacks on Public Cloud SystemsDavide Bove, Tilo Müller. 89-94 [doi]
- Cost and Effect of Using Scheduling Security Model in a Cloud EnvironmentAbdullah Sheikh, Malcolm Munro, David Budgen. 95-101 [doi]
- Methodology for Developing Secure Apps in the Clouds. (MDSAC) for IEEECS ConfererencesGustavo Jose Nieves Arreaza. 102-106 [doi]
- Secure Desktop Computing in the CloudBrian Krisler, Partha Pal, Zech Bertilson, Dan Thomsen. 107-112 [doi]
- Approaches for Collaborative Security Defences in Multi Network EnvironmentsRalph Koning, Gleb Polevoy, Lydia Meijer, Cees de Laat, Paola Grosso. 113-123 [doi]
- A Strong Authentication Method for Web/Mobile ServicesSamy Kambou, Ahmed Bouabdallah. 124-129 [doi]
- Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G NetworksBernardo de Matos Patrocínio dos Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do. 130-135 [doi]
- Research on Improving Network Security of Embedded SystemJiayou Chen, Hong Guo, Wei Hu. 136-138 [doi]
- A Lightweight Blockchain Based Cybersecurity for IoT environmentsOmar A. Abdulkader, Alwi M. Bamahdi, Vijey Thayananthan, Fathy Elbouraey, Bandar Al-Ghamdi. 139-144 [doi]
- Optimum Interval for Application-level CheckpointsMiltiadis G. Siavvas, Erol Gelenbe. 145-150 [doi]
- Efficient Shoulder Surfing Resistant PIN Authentication Scheme Based on Localized Tactile FeedbackWei-Chi Ku, Hao-Jun Xu. 151-156 [doi]
- Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge ComputingWenting Li, Ping Wang. 157-162 [doi]
- Detection of Sources Being Used in DDoS AttacksYalda Khosroshahi, Enver Ozdemir. 163-168 [doi]
- Efficient Protection for VDI WorkstationsAsaf Algawi, Michael Kiperberg, Roee Leon, Amit Resh, Nezer Jacob Zaidenberg. 169-172 [doi]
- A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal AlgorithmsFatma Mallouli, Aya Hellal, Nahla Sharief Saeed, Fatimah Abdulraheem Alzahrani. 173-176 [doi]
- Lagrangian-Based Pattern Extraction for Edge Computing in the Internet of ThingsRoonak Rezvani, Shirin Enshaeifar, Payam M. Barnaghi. 177-182 [doi]
- Edge Computing Node Placement in 5G Networks: A Latency and Reliability Constrained FrameworkAlejandro Santoyo-González, Cristina Cervelló-Pastor. 183-189 [doi]
- DeadPool: Performance Deadline Based Frequency Pooling and Thermal Management Agent in DVFS Enabled MPSoCsSomdip Dey, Amit Kumar Singh, Xiaohang Wang, Klaus Dieter McDonald-Maier. 190-195 [doi]
- Cutting Throughput with the Edge: App-Aware Placement in Fog ComputingFrancescomaria Faticanti, Francesco De Pellegrini, Domenico Siracusa, Daniele Santoro, Silvio Cretti. 196-203 [doi]
- Mind the Shift: Secure Migration of Containerized Processes in Edge ComputingAngelo Liguori, Peter Schoo, Marcel Winandy. 204-209 [doi]
- RewardProfiler: A Reward Based Design Space Profiler on DVFS Enabled MPSoCsSomdip Dey, Amit Kumar Singh, Sangeet Saha, Xiaohang Wang, Klaus Dieter McDonald-Maier. 210-220 [doi]
- Distributed Active Learning Strategies on Edge ComputingJia Qian, Sarada Prasad Gochhayat, Lars Kai Hansen. 221-226 [doi]
- A Review of Fog Network Implementations in Current IoT ProductsNuwan Jayawardene, Pumudu Fernando. 227-232 [doi]