FUPE: A security driven task scheduling approach for SDN-based IoT–Fog networks
Fog computing is a paradigm to overcome the cloud computing limitations which provides
low latency to the users' applications for the Internet of Things (IoT). Software-defined …
low latency to the users' applications for the Internet of Things (IoT). Software-defined …
FPFTS: A joint fuzzy particle swarm optimization mobility‐aware approach to fog task scheduling algorithm for Internet of Things devices
Summary In the Internet of Things (IoT) scenario, the integration with cloud‐based solutions
is of the utmost importance to address the shortcomings resulting from resource‐constrained …
is of the utmost importance to address the shortcomings resulting from resource‐constrained …
[HTML][HTML] HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm
I Sreeram, VPK Vuppala - Applied computing and informatics, 2019 - Elsevier
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack,
which is one that intentionally occupies the computing resources and bandwidth in order to …
which is one that intentionally occupies the computing resources and bandwidth in order to …
FUGE: A joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and a genetic method
Job scheduling is one of the most important research problems in distributed systems,
particularly cloud environments/computing. The dynamic and heterogeneous nature of …
particularly cloud environments/computing. The dynamic and heterogeneous nature of …
On GPU implementation of the island model genetic algorithm for solving the unequal area facility layout problem
X Sun, LF Lai, P Chou, LR Chen, CC Wu - Applied Sciences, 2018 - mdpi.com
Facility layout problem (FLP) is one of the hottest research areas in industrial engineering. A
good facility layout can achieve efficient production management, improve production …
good facility layout can achieve efficient production management, improve production …
[PDF][PDF] SNT algorithm and DCS protocols coalesced a contemporary hasty file sharing with network coding influence
S Suthir, S Janakiraman - Journal of Engineering Research, 2018 - kuwaitjournals.org
Network coding has presently drawn marvelous attention and gifted enrichment of routing to
improve network throughput. In this paper, we propose a swift network transfer (SNT) …
improve network throughput. In this paper, we propose a swift network transfer (SNT) …
Software as a service, Semantic Web, and big data: Theories and applications
K Kasemsap - Research Anthology on Recent Trends, Tools, and …, 2021 - igi-global.com
This chapter explains the overview of software as a service (SaaS); SaaS and application
service provision (ASP); the security concern of SaaS; the perspectives on SaaS adoption; …
service provision (ASP); the security concern of SaaS; the perspectives on SaaS adoption; …
A global user-driven model for tile prefetching in web geographical information systems
S Pan, Y Chong, H Zhang, X Tan - Plos one, 2017 - journals.plos.org
A web geographical information system is a typical service-intensive application. Tile
prefetching and cache replacement can improve cache hit ratios by proactively fetching tiles …
prefetching and cache replacement can improve cache hit ratios by proactively fetching tiles …
TSWA: a unique approach to overcome interest flooding attacks in the cloud using a combination of TSW and attack detection
SK Mohiddin, D Midhunchakkaravarthy… - Multimedia Tools and …, 2024 - Springer
The prevalence of distributed denial of service (DDoS) attacks poses a significant challenge
to the Internet and cloud environments, including emerging architectures like Named Data …
to the Internet and cloud environments, including emerging architectures like Named Data …
An integrity verification scheme of completeness and zero‐knowledge for multi‐Cloud storage
L Cao, W He, Y Liu, X Guo… - International Journal of …, 2017 - Wiley Online Library
To resist the attacks from the malicious Cloud service providers and the organizer, an
integrality verification of completeness and zero‐knowledge property (IVCZKP) scheme for …
integrality verification of completeness and zero‐knowledge property (IVCZKP) scheme for …