From security to assurance in the cloud: A survey
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …
business processes and applications. In the public cloud vision, infrastructure, platform, and …
[图书][B] Internet of things: converging technologies for smart environments and integrated ecosystems
O Vermesan, P Friess - 2013 - books.google.com
Today, we see the integration of Industrial, Business, and Consumer Internet. This
integration is bringing together the Internet of People, Internet of Things, Internet of Energy …
integration is bringing together the Internet of People, Internet of Things, Internet of Energy …
[图书][B] Internet of things applications-from research and innovation to market deployment
O Vermesan, P Friess - 2014 - library.oapen.org
The book aims to provide a broad overview of various topics of Internet of Things from the
research, innovation and development priorities to enabling technologies, nanoelectronics …
research, innovation and development priorities to enabling technologies, nanoelectronics …
A systematic mapping study on intrusion alert analysis in intrusion detection systems
AA Ramaki, A Rasoolzadegan, AG Bafghi - ACM computing surveys …, 2018 - dl.acm.org
Intrusion alert analysis is an attractive and active topic in the area of intrusion detection
systems. In recent decades, many research communities have been working in this field …
systems. In recent decades, many research communities have been working in this field …
A model-based survey of alert correlation techniques
As telecommunication networks evolve rapidly in terms of scalability, complexity, and
heterogeneity, the efficiency of fault localization procedures and the accuracy in the …
heterogeneity, the efficiency of fault localization procedures and the accuracy in the …
Dimension in complexity classes
JH Lutz - SIAM Journal on Computing, 2003 - SIAM
A theory of resource-bounded dimension is developed using gales, which are natural
generalizations of martingales. When the resource bound Δ (a parameter of the theory) is …
generalizations of martingales. When the resource bound Δ (a parameter of the theory) is …
ReMinds: A flexible runtime monitoring framework for systems of systems
Many software-intensive systems today can be characterized as systems of systems (SoS)
comprising complex, interrelated, and heterogeneous systems. The behavior of SoS often …
comprising complex, interrelated, and heterogeneous systems. The behavior of SoS often …
Partitioning of VLSI circuits and systems
FM Johannes - Proceedings of the 33rd Annual Design Automation …, 1996 - dl.acm.org
Partitioning plays an increasingly important role in the design process of VLSI circuits and
systems. There are partitioning problems to be solved on all levels of abstraction. The …
systems. There are partitioning problems to be solved on all levels of abstraction. The …
Fusing information from tickets and alerts to improve the incident resolution process
In the context of network incident monitoring, alerts are useful notifications that provide IT
management staff with information about incidents. They are usually triggered in an …
management staff with information about incidents. They are usually triggered in an …
A resource prediction model for virtualization servers
S Mallick, G Hains, CS Deme - 2012 International Conference …, 2012 - ieeexplore.ieee.org
Monitoring and predicting resource consumption is a fundamental need when running a
virtualized system. Predicting resources is necessary because cloud infrastructures use …
virtualized system. Predicting resources is necessary because cloud infrastructures use …