The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective
Mobile edge computing (MEC) and fog are emerging computing models that extend the
cloud and its services to the edge of the network. The emergence of both MEC and fog …
cloud and its services to the edge of the network. The emergence of both MEC and fog …
Spatio-temporal network traffic estimation and anomaly detection based on convolutional neural network in vehicular ad-hoc networks
Over the last decade, vehicular ad-hoc networks (VANETs) have received a greater attention
in academia and industry due to their influence in intelligent transportation systems …
in academia and industry due to their influence in intelligent transportation systems …
Online transportation network cyber-attack detection based on stationary sensor data
Penetration of connected vehicles and crowdsourced mapping applications give rise to
security vulnerabilities in transportation networks. Accurate detection of cyber-attacks on …
security vulnerabilities in transportation networks. Accurate detection of cyber-attacks on …
RADS: Real-time anomaly detection system for cloud data centres
Cybersecurity attacks in Cloud data centres are increasing alongside the growth of the
Cloud services market. Existing research proposes a number of anomaly detection systems …
Cloud services market. Existing research proposes a number of anomaly detection systems …
Hybrid self-organizing feature map (SOM) for anomaly detection in cloud infrastructures using granular clustering based upon value-difference metrics
IM Stephanakis, IP Chochliouros, E Sfakianakis… - Information …, 2019 - Elsevier
We have witnessed an increase in the availability of data from diverse sources over the past
few years. Cloud computing, big data and Internet-of-Things (IoT) are distinctive cases of …
few years. Cloud computing, big data and Internet-of-Things (IoT) are distinctive cases of …
A conceptual framework for designing an effective community resilience management system
This chapter presents a conceptual framework for designing community resilience
management system (CRMS). We review and discuss the current frameworks on community …
management system (CRMS). We review and discuss the current frameworks on community …
A black-box approach for detecting systems anomalies in virtualized environments
O Ibidunmoye, EB Lakew… - … Conference on Cloud and …, 2017 - ieeexplore.ieee.org
Virtualization technologies allow cloud providers to optimize server utilization and cost by co-
locating services in as few servers as possible. Studies have shown how applications in …
locating services in as few servers as possible. Studies have shown how applications in …
CPU and network traffic anomaly detection method for cloud data center
Z Zhu, R Gu, CL Pan, Y Li, B Zhu, J Li - Proceedings of the 1st …, 2019 - dl.acm.org
With the development of the cloud service market, the number of network security attacks on
cloud data centers is gradually increasing. The existing anomaly detection methods are all …
cloud data centers is gradually increasing. The existing anomaly detection methods are all …
Security in the Cloud: an anomaly-based detection framework for the insider threats
P Carvallo - 2018 - theses.hal.science
Cloud Computing (CC) opens new possibilities for more flexible and efficient services for
Cloud Service Clients (CSCs). However, one of the main issues while migrating to the cloud …
Cloud Service Clients (CSCs). However, one of the main issues while migrating to the cloud …
A Study of Threat Detection Systems and Techniques in the Cloud
P Carvallo, AR Cavalli, N Kushik - Risks and Security of Internet and …, 2018 - Springer
This paper presents a study of existing threat detection techniques in cloud computing,
together with an experimental evaluation of a subset of them. We consider the threats …
together with an experimental evaluation of a subset of them. We consider the threats …