top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cloud computing -- CLOUD 2020 : 13th International Conference, held as part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, proceedings / / Qi Zhang; Yingwei Wang; Liang-Jie Zhang
Cloud computing -- CLOUD 2020 : 13th International Conference, held as part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, proceedings / / Qi Zhang; Yingwei Wang; Liang-Jie Zhang
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XIV, 295 p. 137 illus., 91 illus. in color.)
Disciplina 016.391
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer security
Expert systems / knowledge-based systems
Cloud computing
ISBN 3-030-59635-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Replication Study to Explore Network-Based Co-Residency of Virtual Machines in the Cloud -- Leveraging Federated Clouds For Improving Blockchain Performance -- A Resource Trend Analysis from a Business Perspective based on a Component Decomposition Approach -- A Utility-Based Fault Handling Approach for Efficient Job Rescue in Clouds -- Analyzing CNN Based Behavioural Malware Detection Techniques in Cloud IaaS -- NLC: A Replacement Caching Algorithm based on Non-Critical Path Least Counts for In-Memory Computing -- Job Completion Time in Dynamic Vehicular Cloud Under Multiple Access Points -- PLMSys: A Cloud Monitoring System Based on Cluster Performance and Container Logs -- A Network Intrusion Detection Approach Based on Asymmetric Convolutional Autoencoder -- Post-cloud Computing Models and Their Comparisons -- Wise Toolkit: Enabling Microservice-Based System Performance Experiments -- Abstracting Containerisation and Orchestration for Cloud-Native Applications -- Toward a Decentralized Service Marketplace: The Interplay Between Blockchain and Algebraic Service Composition -- A new personalized POI recommendation based on time-aware and social influence -- Manage Storage Resources Efficiently Using Predictive Analytics -- Scalable Sketch-based Sport Video Retrieval in the Cloud -- Capestor: a Service Mesh-based Capacity Estimation Framework for Cloud Applications -- Cardinality based rate limiting system for time-series data -- Bioinf-PHP: Bioinformatics Pipeline for Protein Homology and Phylogeny -- Online Tutoring through a Cloud-based Virtual Tutoring Center -- Towards multi-criteria volunteer cloud service selection -- ZTIMM: A Zero-Trust-Based Identity Management Model for Volunteer Cloud Computing.
Record Nr. UNISA-996418291203316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cloud computing -- CLOUD 2020 : 13th International Conference, held as part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, proceedings / / Qi Zhang; Yingwei Wang; Liang-Jie Zhang
Cloud computing -- CLOUD 2020 : 13th International Conference, held as part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, proceedings / / Qi Zhang; Yingwei Wang; Liang-Jie Zhang
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XIV, 295 p. 137 illus., 91 illus. in color.)
Disciplina 016.391
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer security
Expert systems / knowledge-based systems
Cloud computing
ISBN 3-030-59635-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Replication Study to Explore Network-Based Co-Residency of Virtual Machines in the Cloud -- Leveraging Federated Clouds For Improving Blockchain Performance -- A Resource Trend Analysis from a Business Perspective based on a Component Decomposition Approach -- A Utility-Based Fault Handling Approach for Efficient Job Rescue in Clouds -- Analyzing CNN Based Behavioural Malware Detection Techniques in Cloud IaaS -- NLC: A Replacement Caching Algorithm based on Non-Critical Path Least Counts for In-Memory Computing -- Job Completion Time in Dynamic Vehicular Cloud Under Multiple Access Points -- PLMSys: A Cloud Monitoring System Based on Cluster Performance and Container Logs -- A Network Intrusion Detection Approach Based on Asymmetric Convolutional Autoencoder -- Post-cloud Computing Models and Their Comparisons -- Wise Toolkit: Enabling Microservice-Based System Performance Experiments -- Abstracting Containerisation and Orchestration for Cloud-Native Applications -- Toward a Decentralized Service Marketplace: The Interplay Between Blockchain and Algebraic Service Composition -- A new personalized POI recommendation based on time-aware and social influence -- Manage Storage Resources Efficiently Using Predictive Analytics -- Scalable Sketch-based Sport Video Retrieval in the Cloud -- Capestor: a Service Mesh-based Capacity Estimation Framework for Cloud Applications -- Cardinality based rate limiting system for time-series data -- Bioinf-PHP: Bioinformatics Pipeline for Protein Homology and Phylogeny -- Online Tutoring through a Cloud-based Virtual Tutoring Center -- Towards multi-criteria volunteer cloud service selection -- ZTIMM: A Zero-Trust-Based Identity Management Model for Volunteer Cloud Computing.
Record Nr. UNINA-9910427715003321
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Internet of things - ICIOT 2022 : 7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang
Internet of things - ICIOT 2022 : 7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (146 pages)
Disciplina 354.81150006
Collana Lecture Notes in Computer Science
Soggetto topico Internet of things
ISBN 3-031-23582-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Services Society -- Services Conference Federation (SCF) -- Contents -- Network Risk Assessment Method Based on Residual Risk Analysis -- 1 Introduction -- 2 Related work -- 3 Model -- 3.1 Formation Definition of Attack Graphs -- 3.2 Construction of Attack Graph Structure -- 3.3 Attack Maps to the Ring Algorithm -- 3.4 Attack Figure Parameters Construction -- 4 Experiment -- 5 Summary -- References -- EIMDC: A New Model for Designing Digital Twin Applications -- 1 Introduction -- 2 Related Works -- 3 EIMDC Model for Digital Twin Applications -- 3.1 Entity -- 3.2 Infrastructure -- 3.3 Data -- 3.4 Model -- 3.5 Context -- 4 Case Study -- 4.1 Entity -- 4.2 Infrastructure -- 4.3 Data -- 4.4 Model -- 4.5 Context -- 5 Conclusions -- References -- Penetration Testing: Smart Home IoT Devices -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experiments and Results -- 4.1 Network Scan Result -- 4.2 Exploit Attempt -- 5 Conclusion -- References -- A Comparative Analysis of User's Concerns and Government Policies on Autonomous Vehicles -- 1 Introduction -- 2 Literature Review -- 3 Data Acquisition and Pre-processing -- 3.1 Social Media Scraping -- 3.2 Government Policies Scraping -- 3.3 Data Pre-processing -- 3.4 Data Categorization -- 4 Data Analysis: Methods and Results -- 4.1 Tri-gram and Word Frequency Analysis -- 4.2 Sentiment Analysis -- 4.3 Topic Modeling -- 4.4 Comparative Analysis: User Concerns VS Government Policies -- 5 Future Directions -- 6 Conclusion -- References -- Design of Multi-data Sources Based Forest Fire Monitoring and Early Warning System -- 1 Introduction -- 2 Related Works -- 3 Top-Level Design -- 3.1 Data Source -- 3.2 System Design Process -- 3.3 Functional Design -- 4 Algorithm Design -- 4.1 Forest Fire Point Satellite Monitoring -- 4.2 Forest Fire Point Video Monitoring.
4.3 Inspectors Report Monitoring and Early Warning -- 5 Implementation and Discussion -- References -- An IoT Simulator Tool for Provisioning Secure and Dynamic User-centric Services -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Performance Analysis of Cryptography Protocols -- 4.1 Protocol Selection Criteria -- 4.2 Performance Analysis -- 5 CupCarbon Tool Setup -- 6 Simulation Parameters -- 7 Simulation Results and Observations -- 7.1 No Encryption Vs. Blowfish Encryption -- 7.2 No Encryption Vs. NtruEncrypt Encryption -- 7.3 Blowfish vs NtruEncrypt Encryption -- 8 Conclusion -- References -- Exploration of Thermoelectric Energy Harvesting for Secure, TLS-Based Industrial IoT Nodes -- 1 Introduction -- 2 Related Work and Background -- 2.1 ULP Secure Wireless IoT Edge Devices -- 2.2 Thermoelectric Energy Harvesting -- 2.3 Energy Storage for Thermoelectric Energy Harvester -- 3 Setup -- 3.1 ULP Secure IoT Application -- 3.2 Energy Harvesting Module -- 3.3 Energy Storage Technologies -- 4 Analysis and Results -- 4.1 ULP Secure IoT Application -- 4.2 Energy Harvesting Module -- 4.3 Energy Storage Technologies -- 4.4 Entire IoT System -- 5 Conclusion -- 6 Future Work -- References -- Lightweight Authentication Encryption to Improve DTLS, Quark Combined with Overhearing to Prevent DoS and MITM on Low-Resource IoT Devices -- 1 Introduction -- 2 Methodology -- 2.1 Solution that Integrates DTLS Protocol and Overhearing Mechanism -- 2.2 Solution Integrating Quark into DTLS with Overhearing -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Comparison of Blynk IoT and ESP Rainmaker on ESP32 as Beginner-Friendly IoT Solutions -- 1 Introduction -- 2 IoT Platforms -- 2.1 Blynk IoT -- 2.2 ESP Rainmaker -- 3 Implementation -- 3.1 Hardware Implementation -- 3.2 Implementation of Blynk IoT -- 3.3 Implementation of ESP Rainmaker -- 4 Results.
5 Conclusion -- References -- Author Index.
Record Nr. UNISA-996503466803316
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Internet of things - ICIOT 2022 : 7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang
Internet of things - ICIOT 2022 : 7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (146 pages)
Disciplina 354.81150006
Collana Lecture Notes in Computer Science
Soggetto topico Internet of things
ISBN 3-031-23582-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Services Society -- Services Conference Federation (SCF) -- Contents -- Network Risk Assessment Method Based on Residual Risk Analysis -- 1 Introduction -- 2 Related work -- 3 Model -- 3.1 Formation Definition of Attack Graphs -- 3.2 Construction of Attack Graph Structure -- 3.3 Attack Maps to the Ring Algorithm -- 3.4 Attack Figure Parameters Construction -- 4 Experiment -- 5 Summary -- References -- EIMDC: A New Model for Designing Digital Twin Applications -- 1 Introduction -- 2 Related Works -- 3 EIMDC Model for Digital Twin Applications -- 3.1 Entity -- 3.2 Infrastructure -- 3.3 Data -- 3.4 Model -- 3.5 Context -- 4 Case Study -- 4.1 Entity -- 4.2 Infrastructure -- 4.3 Data -- 4.4 Model -- 4.5 Context -- 5 Conclusions -- References -- Penetration Testing: Smart Home IoT Devices -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experiments and Results -- 4.1 Network Scan Result -- 4.2 Exploit Attempt -- 5 Conclusion -- References -- A Comparative Analysis of User's Concerns and Government Policies on Autonomous Vehicles -- 1 Introduction -- 2 Literature Review -- 3 Data Acquisition and Pre-processing -- 3.1 Social Media Scraping -- 3.2 Government Policies Scraping -- 3.3 Data Pre-processing -- 3.4 Data Categorization -- 4 Data Analysis: Methods and Results -- 4.1 Tri-gram and Word Frequency Analysis -- 4.2 Sentiment Analysis -- 4.3 Topic Modeling -- 4.4 Comparative Analysis: User Concerns VS Government Policies -- 5 Future Directions -- 6 Conclusion -- References -- Design of Multi-data Sources Based Forest Fire Monitoring and Early Warning System -- 1 Introduction -- 2 Related Works -- 3 Top-Level Design -- 3.1 Data Source -- 3.2 System Design Process -- 3.3 Functional Design -- 4 Algorithm Design -- 4.1 Forest Fire Point Satellite Monitoring -- 4.2 Forest Fire Point Video Monitoring.
4.3 Inspectors Report Monitoring and Early Warning -- 5 Implementation and Discussion -- References -- An IoT Simulator Tool for Provisioning Secure and Dynamic User-centric Services -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Performance Analysis of Cryptography Protocols -- 4.1 Protocol Selection Criteria -- 4.2 Performance Analysis -- 5 CupCarbon Tool Setup -- 6 Simulation Parameters -- 7 Simulation Results and Observations -- 7.1 No Encryption Vs. Blowfish Encryption -- 7.2 No Encryption Vs. NtruEncrypt Encryption -- 7.3 Blowfish vs NtruEncrypt Encryption -- 8 Conclusion -- References -- Exploration of Thermoelectric Energy Harvesting for Secure, TLS-Based Industrial IoT Nodes -- 1 Introduction -- 2 Related Work and Background -- 2.1 ULP Secure Wireless IoT Edge Devices -- 2.2 Thermoelectric Energy Harvesting -- 2.3 Energy Storage for Thermoelectric Energy Harvester -- 3 Setup -- 3.1 ULP Secure IoT Application -- 3.2 Energy Harvesting Module -- 3.3 Energy Storage Technologies -- 4 Analysis and Results -- 4.1 ULP Secure IoT Application -- 4.2 Energy Harvesting Module -- 4.3 Energy Storage Technologies -- 4.4 Entire IoT System -- 5 Conclusion -- 6 Future Work -- References -- Lightweight Authentication Encryption to Improve DTLS, Quark Combined with Overhearing to Prevent DoS and MITM on Low-Resource IoT Devices -- 1 Introduction -- 2 Methodology -- 2.1 Solution that Integrates DTLS Protocol and Overhearing Mechanism -- 2.2 Solution Integrating Quark into DTLS with Overhearing -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Comparison of Blynk IoT and ESP Rainmaker on ESP32 as Beginner-Friendly IoT Solutions -- 1 Introduction -- 2 IoT Platforms -- 2.1 Blynk IoT -- 2.2 ESP Rainmaker -- 3 Implementation -- 3.1 Hardware Implementation -- 3.2 Implementation of Blynk IoT -- 3.3 Implementation of ESP Rainmaker -- 4 Results.
5 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910639898303321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Internet of Things – ICIOT 2021 [[electronic resource] ] : 6th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10–14, 2021, Proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang
Internet of Things – ICIOT 2021 [[electronic resource] ] : 6th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10–14, 2021, Proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (133 pages)
Disciplina 004.678
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer engineering
Computer networks
Computer systems
Application software
Technology—Sociological aspects
Information technology
Computer Engineering and Networks
Computer System Implementation
Computer and Information Systems Applications
Information and Communication Technologies (ICT)
ISBN 3-030-96068-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Overview of Human Activity Recognition Using Wearable Sensors: Healthcare and Artificial Intelligence -- Risks and Challenges of Training Classifiers for IoT -- IoT Applications in Universities: a systematic mapping -- Middleware of Enterprise 5G Messaging Services: Design and Implementation -- Blockchain Developments and Innovations - An Analytical Evaluation of Software Engineering Approaches -- SimuMan: A Simultaneous Real-time Method for Representing Motions and Emotions of Virtual Human in Metaverse -- Electric Transformer Oil Leakage Visual Detection as Service based on LSTM and Genetic Algorithm -- MRA: Metaverse Reference Architecture.
Record Nr. UNISA-996464543303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Internet of Things – ICIOT 2021 : 6th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10–14, 2021, Proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang
Internet of Things – ICIOT 2021 : 6th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10–14, 2021, Proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (133 pages)
Disciplina 004.678
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer engineering
Computer networks
Computer systems
Application software
Technology—Sociological aspects
Information technology
Computer Engineering and Networks
Computer System Implementation
Computer and Information Systems Applications
Information and Communication Technologies (ICT)
ISBN 3-030-96068-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Overview of Human Activity Recognition Using Wearable Sensors: Healthcare and Artificial Intelligence -- Risks and Challenges of Training Classifiers for IoT -- IoT Applications in Universities: a systematic mapping -- Middleware of Enterprise 5G Messaging Services: Design and Implementation -- Blockchain Developments and Innovations - An Analytical Evaluation of Software Engineering Approaches -- SimuMan: A Simultaneous Real-time Method for Representing Motions and Emotions of Virtual Human in Metaverse -- Electric Transformer Oil Leakage Visual Detection as Service based on LSTM and Genetic Algorithm -- MRA: Metaverse Reference Architecture.
Record Nr. UNINA-9910547290903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui