


default search action
CloudCom 2023: Naples, Italy
- IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2023, Naples, Italy, December 4-6, 2023. IEEE 2023, ISBN 979-8-3503-3982-6

- Hend K. Gedawy, Khaled A. Harras

, Temoor Tanveer, Thang Bui
:
Bridging the Chasm Between Ideal and Realistic Federated Learning: A Measurements Study. 1-9 - Vlad-Ioan Luca, Madalina Erascu:

SAGE - A Tool for Optimal Deployments in Kubernetes Clusters. 10-17 - Alf-Andre Walla

, Paal E. Engelstad:
Introducing TinyKVM for High-Performance CDN Edge Services. 18-25 - Mina Morcos, Ibrahim Matta:

Inverse Response Time Ratio Scheduler: Optimizing Throughput and Response Time for Serverless Computing. 26-33 - Chia-Chang Li, Po-Cheng Wu, Che-Rung Lee:

GSLAC: GPU Software Level Access Control for Information Isolation on Cloud Platforms. 34-41 - Roberto Beraldi, Gabriele Proietti Mattia

:
A Load Balancing Algorithm For Long-Life Green Edge Systems. 42-51 - Qiushi Guo, Yifan Chen, Shisha Liao:

Enhancing Mobile Privacy and Security: A Face Skin Patch-Based Anti-Spoofing Approach. 52-57 - Guang Yang, Lorena-Alina Alexandru, Marius Storheim:

A Blockchain-based Online Trading Platform: TrustTrade. 58-62 - Yu Liu, Aitor Hernandez Herranz

:
Enabling 5G QoS configuration capabilities for IoT applications on container orchestration platform. 63-68 - Raj Narendra Shah, Sameer Ahmed Mohamed, Asif Imran, Tevfik Kosar:

CloudScent: A Model for Code Smell Analysis in Open-Source Cloud. 69-75 - Rui Esteves, Håvard Moe Jacobsen, Ola Andrè Flotve:

Recommendation engine for optimal Spark delta tables partitioning. 76-81 - Qiangfeng Shen, Paul Chow:

A Lightweight Routing Layer Using a Reliable Link-Layer Protocol. 82-90 - Enrico Bravi

, Diana Gratiela Berbecaru
, Antonio Lioy:
A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures. 91-98 - Felipe Albuquerque Portella, Paulo J. B. Estrela, Renzo Q. Malini, Luan Teylo, Josep Lluís Berral

, Lúcia M. A. Drummond:
MScheduler: Leveraging Spot Instances for High-Performance Reservoir Simulation in the Cloud. 99-106 - Kerem Çelik, Samridhi Maheshwari, Shereen ElSayed, Markus Mock

, Chandra Krintz, Rich Wolski:
Depot: Dependency-Eager Platform of Transformations. 107-114 - Marlon H. Schweigert, Diego E. G. C. de Oliveira, Guilherme P. Koslovski, Maurício A. Pillon, Charles Christian Miers

:
Experimental analysis of microservices architectures for hosting cloud-based Massive Multiplayer Online Role-Playing Game (MMORPG). 115-122 - David Fernández Blanco, Frédéric Le Mouël, Trista Lin, Amir Rekik:

Can Software Containerisation Fit The Car On-Board Systems ? 123-130 - Sugunakumar Arunan, Gayashan Amarasinghe, Indika Perera:

Cost-optimized scheduling for Microservices in Kubernetes. 131-138 - Marco Abbadini, Michele Beretta

, Dario Facchinetti, Gianluca Oldani, Matthew Rossi
, Stefano Paraboschi:
Lightweight Cloud Application Sandboxing. 139-146 - Jiahe Xu

, Jing Fu, Jingjin Wu
, Moshe Zukerman
:
Energy-Efficient Offloading in Edge Slicing with Non-Linear Power Functions. 147-154 - Joao Henrique Faes Battisti, Vitor E. Batista, Guilherme P. Koslovski, Maurício A. Pillon, Charles Christian Miers

, Marco A. Marques
, Marcos A. Simplício Jr., Diego Kreutz:
Performance analysis of the Raft consensus algorithm on Hyperledger Fabric and Ethereum on cloud. 155-160 - Demetris Trihinas, Moysis Symeonides, Joanna Georgiou, George Pallis, Marios D. Dikaiakos:

Energy-Aware Streaming Analytics Job Scheduling for Edge Computing. 161-168 - Gabriel Fernandez, Andrey Brito, Christof Fetzer:

Triad: Trusted Timestamps in Untrusted Environments. 169-176 - Georgios Fatouros, George Kousiouris, Georgios Makridis, John Soldatos, Michael Filippakis, Dimosthenis Kyriazis:

Enhanced Runtime-Adaptable Routing for Serverless Functions based on Performance and Cost Tradeoffs in Hybrid Cloud Settings. 177-184 - Siqi Zhang, Minjie Cai, Mengyuan Zhang, Lianying Zhao

, Xavier de Carné de Carnavalet
:
The Flaw Within: Identifying CVSS Score Discrepancies in the NVD. 185-192 - Di Mo, Robert Cordingly, Donald Chinn, Wes Lloyd:

Addressing Serverless Computing Vendor Lock-In through Cloud Service Abstraction. 193-199 - Muhammad Anjum Malik, Tobias Pleuger, Stephan Recker:

Peer-to-Peer Approach for Edge Computing Services. 200-207 - Marta Catillo, Antonio Pecchia, Umberto Villano:

Traditional vs Federated Learning with Deep Autoencoders: a Study in IoT Intrusion Detection. 208-215 - Biagio Boi, Christian Esposito:

Decentralized Authentication in Microservice Architectures with SSI and DID in Blockchain. 216-223 - Fabrizio Messina, Miriana Russo, Corrado Santoro

, Federico Fausto Santoro, Salvatore Riccobene:
PuppetStack: A tool for building high-availability private cloud infrastructures. 224-231 - Gennaro Pio Rimoli

, Daniele Granata, Massimo Ficco:
Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case Study. 232-237 - Jinwei Liu, Rui Gong, Wei Dai, Wei Zheng, Ying Mao, Wei Zhou, Feng Deng:

HCoop: A Cooperative and Hybrid Resource Scheduling for Heterogeneous Jobs in Clouds. 238-245 - Provakar Mondal

, Eli Tilevich:
Undoing CRDT Operations Automatically. 246-251 - Bala Subramanyan, Arne Hollum, Giovanni Mazzeo, Matthew Ficke, Darshan Vaydia:

Enabling Trusted TEE-as-a-Service Models with Privacy Preserving Automatons. 252-260 - Lamees M. Al Qassem

, Thanos Stouraitis, Ernesto Damiani, Ibrahim Abe M. Elfadel:
OSμS: An Open-Source Microservice Prototyping Platform. 261-268 - Valeria Valdés, Ana Rosa Cavalli, Fatiha Zaïdi, Wissam Mallouli:

Testing techniques to assess impact and cascading effects. 269-272 - Mario Barbareschi, Valentina Casola, Daniele Lombardi:

Ensuring End-to-End Security in Computing Continuum Exploiting Physical Unclonable Functions. 273-278 - Md. Mahbubul Islam, Tanwir Ahmad, Dragos Truscan

:
An Evaluation of Transformer Models for Early Intrusion Detection in Cloud Continuum. 279-284 - Lorens Barraud, Francesco G. Caccavale, Jean-Baptiste Peyrat, Wissam Mallouli, Véronique Capdevielle, Hicham Khalife, Ana Rosa Cavalli:

5G SUCI Catcher: Attack and Detection. 285-290 - Eider Iturbe

, Erkuden Rios, Nerea Toledo:
Towards trustworthy Artificial Intelligence: Security risk assessment methodology for Artificial Intelligence systems. 291-297 - Phu Hong Nguyen, Rustem Dautov, Hui Song, Angel Rego, Eider Iturbe

, Erkuden Rios, Diego Sagasti, Gonzalo Nicolas, Valeria Valdés, Wissam Mallouli, Ana R. Cavalli, Nicolas Ferry:
Towards Smarter Security Orchestration and Automatic Response for CPS and IoT. 298-302 - Seung-Seok Lee, Sang-Joon Lee:

Design and Implementation of Web3-Based E-Commerce Cryptocurrency Payment System. 303-308 - Panagiotis I. Radoglou-Grammatikis

, Elisavet Kioseoglou, Dimitrios Christos Asimopoulos
, Miltiadis G. Siavvas, Ioannis Nanos, Thomas Lagkas, Vasileios Argyriou, Konstantinos E. Psannis
, Sotirios K. Goudos, Panagiotis G. Sarigiannidis:
Surveying Cyber Threat Intelligence and Collaboration: A Concise Analysis of Current Landscape and Trends. 309-314 - Polina Minina, Andrey Sadovykh, Vladimir Ivanov:

Detecting Security Requirements in GitHub Issues -Novel Dataset and SmallBERT-based model. 315-318 - Lars Andreassen Jaatun, Silje Marie Sørlien, Ravishankar Borgaonkar, Steve Taylor, Martin Gilje Jaatun:

Software Bill of Materials in Critical Infrastructure. 319-324 - Bernadet Klein Wassink, Zhiming Zhao:

Increasing Robustness of Blockchain Peer-to-Peer Networks with Alternative Peer Initialization. 325-332 - Smruti Inamdar, Zhiming Zhao:

Decoding NFT Market Dynamics with Data. 333-340 - Jungwon Seo, Nan Zhang, Chunming Rong:

Flexible and Secure Code Deployment in Federated Learning using Large Language Models: Prompt Engineering to Enhance Malicious Code Detection. 341-349

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














