The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective

SN Shirazi, A Gouglidis, A Farshad… - IEEE Journal on …, 2017 - ieeexplore.ieee.org
Mobile edge computing (MEC) and fog are emerging computing models that extend the
cloud and its services to the edge of the network. The emergence of both MEC and fog …

Performance anomaly detection and bottleneck identification

O Ibidunmoye, F Hernández-Rodriguez… - ACM Computing Surveys …, 2015 - dl.acm.org
In order to meet stringent performance requirements, system administrators must effectively
detect undesirable performance behaviours, identify potential root causes, and take …

Malware detection in cloud computing infrastructures

MR Watson, AK Marnerides, A Mauthe… - … on Dependable and …, 2015 - ieeexplore.ieee.org
Cloud services are prominent within the private, public and commercial domains. Many of
these services are expected to be always on and have a critical nature; therefore, security …

Online diagnosis of performance variation in HPC systems using machine learning

O Tuncer, E Ates, Y Zhang, A Turk… - … on Parallel and …, 2018 - ieeexplore.ieee.org
As the size and complexity of high performance computing (HPC) systems grow in line with
advancements in hardware and software technology, HPC systems increasingly suffer from …

A systematic review on anomaly detection for cloud computing environments

T Hagemann, K Katsarou - Proceedings of the 2020 3rd Artificial …, 2020 - dl.acm.org
The detection of anomalies in data is a far-reaching field of research which also applies to
the field of cloud computing in several different ways: from the detection of various types of …

HPAS: An HPC performance anomaly suite for reproducing performance variations

E Ates, Y Zhang, B Aksar, J Brandt, VJ Leung… - Proceedings of the 48th …, 2019 - dl.acm.org
Modern high performance computing (HPC) systems, including supercomputers, routinely
suffer from substantial performance variations. The same application with the same input …

Semi-supervised range-based anomaly detection for cloud systems

PK Deka, Y Verma, AB Bhutto… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The inherent characteristics of cloud systems often lead to anomalies, which pose
challenges for high availability, reliability, and high performance. Detecting anomalies in …

A hybrid push protocol for resource monitoring in cloud computing platforms

M Lin, Z Yao, T Huang - Optik, 2016 - Elsevier
Cloud computing platforms often consist of a large number of physical computer nodes. With
the increasing number of physical computer nodes, cloud computing platforms become …

Hybridisation of classifiers for anomaly detection in big data

RM Alguliyev, RM Aliguliyev… - … Journal of Big Data …, 2019 - inderscienceonline.com
Recently, the widespread use of cloud technologies has led to the rapid increase in the
scale and complexity of this infrastructure. The degradation and downtimes in the …

Malware mitigation in cloud computing architecture

SK Medaram, L Maglaras - Cyber Malware: Offensive and Defensive …, 2023 - Springer
Cloud computing is one of the decade's most trending discussions in information
technology. The cloud is not an array of software, hardware or services but a vast shared …