


default search action
6th CSCloud / 5th EdgeCom 2019: Paris, France
- Meikang Qiu:

6th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2019 / 5th IEEE International Conference on Edge Computing and Scalable Cloud, EdgeCom 2019, Paris, France, June 21-23, 2019. IEEE 2019, ISBN 978-1-7281-1661-7
CSCloud 1: Cloud Computing 1
- Tariqul Islam, Dakshnamoorthy Manivannan

:
FaCS: Toward a Fault-Tolerant Cloud Scheduler Leveraging Long Short-Term Memory Network. 1-6 - Katarzyna Kapusta, Han Qiu

, Gérard Memmi
:
Reinforcing Protection Against Chosen-Plaintext Attack Using Ciphertext Fragmentation in Multi-cloud Environments. 7-9 - Hussein Al-Zoubi:

Efficient Task Scheduling for Applications on Clouds. 10-13 - Bruno Dzogovic

, Bernardo Santos
, Van Thuan Do, Boning Feng, Niels Jacot, Thanh Van Do:
Connecting Remote eNodeB with Containerized 5G C-RANs in OpenStack Cloud. 14-19
CSCloud 2: Cloud Computing 2
- Tudor Antohi:

Model for Cloud Migration Cost. 20-28 - Aatish Chiniah, Avinash Mungur

:
Dynamic Erasure Coding Policy Allocation (DECPA) in Hadoop 3.0. 29-33
CSCloud 3: Cloud Computing 3
- Yuchia Tseng, Gopalasingham Aravinthan, Bela Berde, Sofiane Imadali, Drissa Houatra, Han Qiu

:
Re-Think Monitoring Services for 5G Network: Challenges and Perspectives. 34-39 - Meng Ma, Jun Yang, Ping Wang, Weijie Liu, Jingzhuo Zhang:

Light-Weight and Scalable Hierarchical-MVC Architecture for Cloud Web Applications. 40-45 - Shirin Dabbaghi Varnosfaderani, Piotr Kasprzak, Christof Pohl, Ramin Yahyapour

:
A Flexible and Compatible Model for Supporting Assurance Level through a Central Proxy. 46-52
CSCloud 4: Machine Learning
- Xinyu Gong, Yuefu Zhou, Yue Bi, Mingcheng He, Shiying Sheng, Han Qiu

, Ruan He, Jialiang Lu:
Estimating Web Attack Detection via Model Uncertainty from Inaccurate Annotation. 53-58 - Naiji Zhang, Fehmi Jaafar, Yasir Malik:

Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine Learning. 59-62 - Tirath Prasad Sahu

, Reswanth Sai Thummalapudi, Naresh Kumar Nagwani
:
Automatic Question Tagging Using Multi-label Classification in Community Question Answering Sites. 63-68 - Vaibhav Singh, Kapil Sharma

:
Empirical Analysis of Shallow and Deep Architecture Classifiers on Emotion Recognition from Speech. 69-73
CSCloud 5: Security on Cloud Computing 1
- Wenjun Fan, Joanna Ziembicka, Rogério de Lemos, David W. Chadwick, Francesco Di Cerbo, Ali Sajjad, Xiao-Si Wang, Ian Herwono:

Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud. 74-80 - Olusola Akinrolabu, Steve New

, Andrew Martin:
Assessing the Security Risks of Multicloud SaaS Applications: A Real-World Case Study. 81-88 - Davide Bove

, Tilo Müller:
Investigating Characteristics of Attacks on Public Cloud Systems. 89-94 - Abdullah Sheikh

, Malcolm Munro, David Budgen
:
Cost and Effect of Using Scheduling Security Model in a Cloud Environment. 95-101
CSCloud 6: Security on Cloud Computing 2
- Gustavo Jose Nieves Arreaza

:
Methodology for Developing Secure Apps in the Clouds. (MDSAC) for IEEECS Confererences. 102-106 - Brian Krisler, Partha Pratim Pal

, Zech Bertilson, Dan Thomsen:
Secure Desktop Computing in the Cloud. 107-112 - Ralph Koning, Gleb Polevoy

, Lydia Meijer, Cees de Laat, Paola Grosso
:
Approaches for Collaborative Security Defences in Multi Network Environments. 113-123
CSCloud 7: System Security 1
- Samy Kambou, Ahmed Bouabdallah:

A Strong Authentication Method for Web/Mobile Services. 124-129 - Bernardo de Matos Patrocínio dos Santos

, Bruno Dzogovic
, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do:
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks. 130-135 - JiaYou Chen, Hong Guo, Wei Hu:

Research on Improving Network Security of Embedded System. 136-138 - Omar A. Abdulkader

, Alwi M. Bamhdi, Vijey Thayananthan, Fathy Elbouraey, Bandar Al-Ghamdi:
A Lightweight Blockchain Based Cybersecurity for IoT environments. 139-144
CSCloud 8: System Security 2
- Miltiadis G. Siavvas, Erol Gelenbe:

Optimum Interval for Application-level Checkpoints. 145-150 - Wei-Chi Ku, Hao-Jun Xu:

Efficient Shoulder Surfing Resistant PIN Authentication Scheme Based on Localized Tactile Feedback. 151-156 - Wenting Li, Ping Wang:

Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing. 157-162
CSCloud 9: System Security 3
- Yalda Khosroshahi, Enver Ozdemir:

Detection of Sources Being Used in DDoS Attacks. 163-168 - Asaf Algawi, Michael Kiperberg, Roee Leon, Amit Resh, Nezer Jacob Zaidenberg

:
Efficient Protection for VDI Workstations. 169-172 - Fatma Mallouli

, Aya Hellal, Nahla Sharief Saeed, Fatimah Abdulraheem Alzahrani:
A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms. 173-176
EdgeCom 1
- Roonak Rezvani

, Shirin Enshaeifar, Payam M. Barnaghi:
Lagrangian-Based Pattern Extraction for Edge Computing in the Internet of Things. 177-182 - Alejandro Santoyo-González, Cristina Cervelló-Pastor:

Edge Computing Node Placement in 5G Networks: A Latency and Reliability Constrained Framework. 183-189 - Somdip Dey

, Amit Kumar Singh, Xiaohang Wang, Klaus Dieter McDonald-Maier
:
DeadPool: Performance Deadline Based Frequency Pooling and Thermal Management Agent in DVFS Enabled MPSoCs. 190-195 - Francescomaria Faticanti, Francesco De Pellegrini, Domenico Siracusa

, Daniele Santoro, Silvio Cretti:
Cutting Throughput with the Edge: App-Aware Placement in Fog Computing. 196-203
EdgeCom 2
- Angelo Liguori, Peter Schoo, Marcel Winandy:

Mind the Shift: Secure Migration of Containerized Processes in Edge Computing. 204-209 - Somdip Dey

, Amit Kumar Singh, Sangeet Saha, Xiaohang Wang, Klaus Dieter McDonald-Maier
:
RewardProfiler: A Reward Based Design Space Profiler on DVFS Enabled MPSoCs. 210-220 - Jia Qian

, Sarada Prasad Gochhayat, Lars Kai Hansen
:
Distributed Active Learning Strategies on Edge Computing. 221-226 - Nuwan Jayawardene, Pumudu Fernando

:
A Review of Fog Network Implementations in Current IoT Products. 227-232

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














