Cloud computing -- CLOUD 2020 : 13th International Conference, held as part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, proceedings / / Qi Zhang; Yingwei Wang; Liang-Jie Zhang |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XIV, 295 p. 137 illus., 91 illus. in color.) |
Disciplina | 016.391 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computer security
Expert systems / knowledge-based systems Cloud computing |
ISBN | 3-030-59635-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Replication Study to Explore Network-Based Co-Residency of Virtual Machines in the Cloud -- Leveraging Federated Clouds For Improving Blockchain Performance -- A Resource Trend Analysis from a Business Perspective based on a Component Decomposition Approach -- A Utility-Based Fault Handling Approach for Efficient Job Rescue in Clouds -- Analyzing CNN Based Behavioural Malware Detection Techniques in Cloud IaaS -- NLC: A Replacement Caching Algorithm based on Non-Critical Path Least Counts for In-Memory Computing -- Job Completion Time in Dynamic Vehicular Cloud Under Multiple Access Points -- PLMSys: A Cloud Monitoring System Based on Cluster Performance and Container Logs -- A Network Intrusion Detection Approach Based on Asymmetric Convolutional Autoencoder -- Post-cloud Computing Models and Their Comparisons -- Wise Toolkit: Enabling Microservice-Based System Performance Experiments -- Abstracting Containerisation and Orchestration for Cloud-Native Applications -- Toward a Decentralized Service Marketplace: The Interplay Between Blockchain and Algebraic Service Composition -- A new personalized POI recommendation based on time-aware and social influence -- Manage Storage Resources Efficiently Using Predictive Analytics -- Scalable Sketch-based Sport Video Retrieval in the Cloud -- Capestor: a Service Mesh-based Capacity Estimation Framework for Cloud Applications -- Cardinality based rate limiting system for time-series data -- Bioinf-PHP: Bioinformatics Pipeline for Protein Homology and Phylogeny -- Online Tutoring through a Cloud-based Virtual Tutoring Center -- Towards multi-criteria volunteer cloud service selection -- ZTIMM: A Zero-Trust-Based Identity Management Model for Volunteer Cloud Computing. |
Record Nr. | UNISA-996418291203316 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cloud computing -- CLOUD 2020 : 13th International Conference, held as part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, proceedings / / Qi Zhang; Yingwei Wang; Liang-Jie Zhang |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XIV, 295 p. 137 illus., 91 illus. in color.) |
Disciplina | 016.391 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computer security
Expert systems / knowledge-based systems Cloud computing |
ISBN | 3-030-59635-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Replication Study to Explore Network-Based Co-Residency of Virtual Machines in the Cloud -- Leveraging Federated Clouds For Improving Blockchain Performance -- A Resource Trend Analysis from a Business Perspective based on a Component Decomposition Approach -- A Utility-Based Fault Handling Approach for Efficient Job Rescue in Clouds -- Analyzing CNN Based Behavioural Malware Detection Techniques in Cloud IaaS -- NLC: A Replacement Caching Algorithm based on Non-Critical Path Least Counts for In-Memory Computing -- Job Completion Time in Dynamic Vehicular Cloud Under Multiple Access Points -- PLMSys: A Cloud Monitoring System Based on Cluster Performance and Container Logs -- A Network Intrusion Detection Approach Based on Asymmetric Convolutional Autoencoder -- Post-cloud Computing Models and Their Comparisons -- Wise Toolkit: Enabling Microservice-Based System Performance Experiments -- Abstracting Containerisation and Orchestration for Cloud-Native Applications -- Toward a Decentralized Service Marketplace: The Interplay Between Blockchain and Algebraic Service Composition -- A new personalized POI recommendation based on time-aware and social influence -- Manage Storage Resources Efficiently Using Predictive Analytics -- Scalable Sketch-based Sport Video Retrieval in the Cloud -- Capestor: a Service Mesh-based Capacity Estimation Framework for Cloud Applications -- Cardinality based rate limiting system for time-series data -- Bioinf-PHP: Bioinformatics Pipeline for Protein Homology and Phylogeny -- Online Tutoring through a Cloud-based Virtual Tutoring Center -- Towards multi-criteria volunteer cloud service selection -- ZTIMM: A Zero-Trust-Based Identity Management Model for Volunteer Cloud Computing. |
Record Nr. | UNINA-9910427715003321 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Internet of things - ICIOT 2022 : 7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (146 pages) |
Disciplina | 354.81150006 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Internet of things |
ISBN | 3-031-23582-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Services Society -- Services Conference Federation (SCF) -- Contents -- Network Risk Assessment Method Based on Residual Risk Analysis -- 1 Introduction -- 2 Related work -- 3 Model -- 3.1 Formation Definition of Attack Graphs -- 3.2 Construction of Attack Graph Structure -- 3.3 Attack Maps to the Ring Algorithm -- 3.4 Attack Figure Parameters Construction -- 4 Experiment -- 5 Summary -- References -- EIMDC: A New Model for Designing Digital Twin Applications -- 1 Introduction -- 2 Related Works -- 3 EIMDC Model for Digital Twin Applications -- 3.1 Entity -- 3.2 Infrastructure -- 3.3 Data -- 3.4 Model -- 3.5 Context -- 4 Case Study -- 4.1 Entity -- 4.2 Infrastructure -- 4.3 Data -- 4.4 Model -- 4.5 Context -- 5 Conclusions -- References -- Penetration Testing: Smart Home IoT Devices -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experiments and Results -- 4.1 Network Scan Result -- 4.2 Exploit Attempt -- 5 Conclusion -- References -- A Comparative Analysis of User's Concerns and Government Policies on Autonomous Vehicles -- 1 Introduction -- 2 Literature Review -- 3 Data Acquisition and Pre-processing -- 3.1 Social Media Scraping -- 3.2 Government Policies Scraping -- 3.3 Data Pre-processing -- 3.4 Data Categorization -- 4 Data Analysis: Methods and Results -- 4.1 Tri-gram and Word Frequency Analysis -- 4.2 Sentiment Analysis -- 4.3 Topic Modeling -- 4.4 Comparative Analysis: User Concerns VS Government Policies -- 5 Future Directions -- 6 Conclusion -- References -- Design of Multi-data Sources Based Forest Fire Monitoring and Early Warning System -- 1 Introduction -- 2 Related Works -- 3 Top-Level Design -- 3.1 Data Source -- 3.2 System Design Process -- 3.3 Functional Design -- 4 Algorithm Design -- 4.1 Forest Fire Point Satellite Monitoring -- 4.2 Forest Fire Point Video Monitoring.
4.3 Inspectors Report Monitoring and Early Warning -- 5 Implementation and Discussion -- References -- An IoT Simulator Tool for Provisioning Secure and Dynamic User-centric Services -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Performance Analysis of Cryptography Protocols -- 4.1 Protocol Selection Criteria -- 4.2 Performance Analysis -- 5 CupCarbon Tool Setup -- 6 Simulation Parameters -- 7 Simulation Results and Observations -- 7.1 No Encryption Vs. Blowfish Encryption -- 7.2 No Encryption Vs. NtruEncrypt Encryption -- 7.3 Blowfish vs NtruEncrypt Encryption -- 8 Conclusion -- References -- Exploration of Thermoelectric Energy Harvesting for Secure, TLS-Based Industrial IoT Nodes -- 1 Introduction -- 2 Related Work and Background -- 2.1 ULP Secure Wireless IoT Edge Devices -- 2.2 Thermoelectric Energy Harvesting -- 2.3 Energy Storage for Thermoelectric Energy Harvester -- 3 Setup -- 3.1 ULP Secure IoT Application -- 3.2 Energy Harvesting Module -- 3.3 Energy Storage Technologies -- 4 Analysis and Results -- 4.1 ULP Secure IoT Application -- 4.2 Energy Harvesting Module -- 4.3 Energy Storage Technologies -- 4.4 Entire IoT System -- 5 Conclusion -- 6 Future Work -- References -- Lightweight Authentication Encryption to Improve DTLS, Quark Combined with Overhearing to Prevent DoS and MITM on Low-Resource IoT Devices -- 1 Introduction -- 2 Methodology -- 2.1 Solution that Integrates DTLS Protocol and Overhearing Mechanism -- 2.2 Solution Integrating Quark into DTLS with Overhearing -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Comparison of Blynk IoT and ESP Rainmaker on ESP32 as Beginner-Friendly IoT Solutions -- 1 Introduction -- 2 IoT Platforms -- 2.1 Blynk IoT -- 2.2 ESP Rainmaker -- 3 Implementation -- 3.1 Hardware Implementation -- 3.2 Implementation of Blynk IoT -- 3.3 Implementation of ESP Rainmaker -- 4 Results. 5 Conclusion -- References -- Author Index. |
Record Nr. | UNISA-996503466803316 |
Cham, Switzerland : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Internet of things - ICIOT 2022 : 7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (146 pages) |
Disciplina | 354.81150006 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Internet of things |
ISBN | 3-031-23582-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Services Society -- Services Conference Federation (SCF) -- Contents -- Network Risk Assessment Method Based on Residual Risk Analysis -- 1 Introduction -- 2 Related work -- 3 Model -- 3.1 Formation Definition of Attack Graphs -- 3.2 Construction of Attack Graph Structure -- 3.3 Attack Maps to the Ring Algorithm -- 3.4 Attack Figure Parameters Construction -- 4 Experiment -- 5 Summary -- References -- EIMDC: A New Model for Designing Digital Twin Applications -- 1 Introduction -- 2 Related Works -- 3 EIMDC Model for Digital Twin Applications -- 3.1 Entity -- 3.2 Infrastructure -- 3.3 Data -- 3.4 Model -- 3.5 Context -- 4 Case Study -- 4.1 Entity -- 4.2 Infrastructure -- 4.3 Data -- 4.4 Model -- 4.5 Context -- 5 Conclusions -- References -- Penetration Testing: Smart Home IoT Devices -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experiments and Results -- 4.1 Network Scan Result -- 4.2 Exploit Attempt -- 5 Conclusion -- References -- A Comparative Analysis of User's Concerns and Government Policies on Autonomous Vehicles -- 1 Introduction -- 2 Literature Review -- 3 Data Acquisition and Pre-processing -- 3.1 Social Media Scraping -- 3.2 Government Policies Scraping -- 3.3 Data Pre-processing -- 3.4 Data Categorization -- 4 Data Analysis: Methods and Results -- 4.1 Tri-gram and Word Frequency Analysis -- 4.2 Sentiment Analysis -- 4.3 Topic Modeling -- 4.4 Comparative Analysis: User Concerns VS Government Policies -- 5 Future Directions -- 6 Conclusion -- References -- Design of Multi-data Sources Based Forest Fire Monitoring and Early Warning System -- 1 Introduction -- 2 Related Works -- 3 Top-Level Design -- 3.1 Data Source -- 3.2 System Design Process -- 3.3 Functional Design -- 4 Algorithm Design -- 4.1 Forest Fire Point Satellite Monitoring -- 4.2 Forest Fire Point Video Monitoring.
4.3 Inspectors Report Monitoring and Early Warning -- 5 Implementation and Discussion -- References -- An IoT Simulator Tool for Provisioning Secure and Dynamic User-centric Services -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Performance Analysis of Cryptography Protocols -- 4.1 Protocol Selection Criteria -- 4.2 Performance Analysis -- 5 CupCarbon Tool Setup -- 6 Simulation Parameters -- 7 Simulation Results and Observations -- 7.1 No Encryption Vs. Blowfish Encryption -- 7.2 No Encryption Vs. NtruEncrypt Encryption -- 7.3 Blowfish vs NtruEncrypt Encryption -- 8 Conclusion -- References -- Exploration of Thermoelectric Energy Harvesting for Secure, TLS-Based Industrial IoT Nodes -- 1 Introduction -- 2 Related Work and Background -- 2.1 ULP Secure Wireless IoT Edge Devices -- 2.2 Thermoelectric Energy Harvesting -- 2.3 Energy Storage for Thermoelectric Energy Harvester -- 3 Setup -- 3.1 ULP Secure IoT Application -- 3.2 Energy Harvesting Module -- 3.3 Energy Storage Technologies -- 4 Analysis and Results -- 4.1 ULP Secure IoT Application -- 4.2 Energy Harvesting Module -- 4.3 Energy Storage Technologies -- 4.4 Entire IoT System -- 5 Conclusion -- 6 Future Work -- References -- Lightweight Authentication Encryption to Improve DTLS, Quark Combined with Overhearing to Prevent DoS and MITM on Low-Resource IoT Devices -- 1 Introduction -- 2 Methodology -- 2.1 Solution that Integrates DTLS Protocol and Overhearing Mechanism -- 2.2 Solution Integrating Quark into DTLS with Overhearing -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Comparison of Blynk IoT and ESP Rainmaker on ESP32 as Beginner-Friendly IoT Solutions -- 1 Introduction -- 2 IoT Platforms -- 2.1 Blynk IoT -- 2.2 ESP Rainmaker -- 3 Implementation -- 3.1 Hardware Implementation -- 3.2 Implementation of Blynk IoT -- 3.3 Implementation of ESP Rainmaker -- 4 Results. 5 Conclusion -- References -- Author Index. |
Record Nr. | UNINA-9910639898303321 |
Cham, Switzerland : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Internet of Things – ICIOT 2021 [[electronic resource] ] : 6th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10–14, 2021, Proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (133 pages) |
Disciplina | 004.678 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer engineering
Computer networks Computer systems Application software Technology—Sociological aspects Information technology Computer Engineering and Networks Computer System Implementation Computer and Information Systems Applications Information and Communication Technologies (ICT) |
ISBN | 3-030-96068-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | An Overview of Human Activity Recognition Using Wearable Sensors: Healthcare and Artificial Intelligence -- Risks and Challenges of Training Classifiers for IoT -- IoT Applications in Universities: a systematic mapping -- Middleware of Enterprise 5G Messaging Services: Design and Implementation -- Blockchain Developments and Innovations - An Analytical Evaluation of Software Engineering Approaches -- SimuMan: A Simultaneous Real-time Method for Representing Motions and Emotions of Virtual Human in Metaverse -- Electric Transformer Oil Leakage Visual Detection as Service based on LSTM and Genetic Algorithm -- MRA: Metaverse Reference Architecture. |
Record Nr. | UNISA-996464543303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Internet of Things – ICIOT 2021 : 6th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10–14, 2021, Proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (133 pages) |
Disciplina | 004.678 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer engineering
Computer networks Computer systems Application software Technology—Sociological aspects Information technology Computer Engineering and Networks Computer System Implementation Computer and Information Systems Applications Information and Communication Technologies (ICT) |
ISBN | 3-030-96068-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | An Overview of Human Activity Recognition Using Wearable Sensors: Healthcare and Artificial Intelligence -- Risks and Challenges of Training Classifiers for IoT -- IoT Applications in Universities: a systematic mapping -- Middleware of Enterprise 5G Messaging Services: Design and Implementation -- Blockchain Developments and Innovations - An Analytical Evaluation of Software Engineering Approaches -- SimuMan: A Simultaneous Real-time Method for Representing Motions and Emotions of Virtual Human in Metaverse -- Electric Transformer Oil Leakage Visual Detection as Service based on LSTM and Genetic Algorithm -- MRA: Metaverse Reference Architecture. |
Record Nr. | UNINA-9910547290903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|