Enhancing Network Visibility and Security through Tensor Analysis (Englisch)
- Neue Suche nach: Baskaran, Muthu M.
- Neue Suche nach: Henretty, Thomas
- Neue Suche nach: Ezick, James
- Neue Suche nach: Lethin, Richard
- Neue Suche nach: Bruns-Smith, David
- Neue Suche nach: Baskaran, Muthu M.
- Neue Suche nach: Henretty, Thomas
- Neue Suche nach: Ezick, James
- Neue Suche nach: Lethin, Richard
- Neue Suche nach: Bruns-Smith, David
In:
Future Generation Computer Systems
;
96
;
207-215
;
2019
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Enhancing Network Visibility and Security through Tensor Analysis
-
Beteiligte:Baskaran, Muthu M. ( Autor:in ) / Henretty, Thomas ( Autor:in ) / Ezick, James ( Autor:in ) / Lethin, Richard ( Autor:in ) / Bruns-Smith, David ( Autor:in )
-
Erschienen in:Future Generation Computer Systems ; 96 ; 207-215
-
Verlag:
-
Erscheinungsdatum:19.01.2019
-
Format / Umfang:9 pages
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 96
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Intelligent conditional collaborative private data sharingBianchi, Giuseppe / Dargahi, Tooska / Caponi, Alberto / Conti, Mauro et al. | 2019
- 11
-
SoC-based computing infrastructures for scientific applications and commercial services: Performance and economic evaluationsD’Agostino, Daniele / Quarati, Alfonso / Clematis, Andrea / Morganti, Lucia / Corni, Elena / Giansanti, Valentina / Cesini, Daniele / Merelli, Ivan et al. | 2019
- 23
-
DC coefficient recovery for JPEG images in ubiquitous communication systemsQiu, Han / Memmi, Gerard / Chen, Xuan / Xiong, Jian et al. | 2019
- 32
-
Editorial for Special issue of FGCS special issue on “Benchmarking big data systems”Sakr, Sherif / Zomaya, Albert / Vasilakos, Athanasios V. et al. | 2019
- 35
-
Competition in data-based service provision: Nash equilibrium characterizationGuijarro, Luis / Pla, Vicent / Vidal, Jose R. / Naldi, Maurizio et al. | 2019
- 51
-
Activity-based model for medium-sized cities considering external activity–travel: Enhancing FEATHERS frameworkBaqueri, Syed Fazal Abbas / Adnan, Muhammad / Kochan, Bruno / Bellemans, Tom et al. | 2019
- 64
-
A semantic-based correlation approach for detecting hybrid and low-level APTsLajevardi, Amir Mohammadzade / Amini, Morteza et al. | 2019
- 89
-
An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehiclesXu, Xiaolong / Xue, Yuan / Qi, Lianyong / Yuan, Yuan / Zhang, Xuyun / Umer, Tariq / Wan, Shaohua et al. | 2019
- 101
-
An analytic computation-driven algorithm for Decentralized Multicore SystemsLin, Yezhi / Jin, Xinyuan / Chen, Jiuqiang / Sodhro, Ali Hassan / Pan, Zhifang et al. | 2019
- 111
-
Task migration for mobile edge computing using deep reinforcement learningZhang, Cheng / Zheng, Zixuan et al. | 2019
- 119
-
A tale of three systems: Case studies on the application of architectural tactics for cyber-foragingLewis, Grace / Lago, Patricia / Echeverría, Sebastián / Simoens, Pieter et al. | 2019
- 148
-
Probabilistic normed load monitoring in large scale distributed systems using mobile agentsAli, Moazam / Bagchi, Susmit et al. | 2019
- 168
-
An energy efficient IoT data compression approach for edge machine learningAzar, Joseph / Makhoul, Abdallah / Barhamgi, Mahmoud / Couturier, Raphaël et al. | 2019
- 176
-
Incorporating URL embedding into ensemble clustering to detect web anomaliesLi, Bo / Yuan, Guiqin / Shen, Li / Zhang, Ruoyi / Yao, Yiyang et al. | 2019
- 185
-
PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKIJiang, Wenbo / Li, Hongwei / Xu, Guowen / Wen, Mi / Dong, Guishan / Lin, Xiaodong et al. | 2019
- 196
-
EATDDS: Energy-aware middleware for wireless sensor and actuator networksAl-Roubaiey, Anas / Sheltami, Tarek / Mahmoud, Ashraf / Yasar, Ansar et al. | 2019
- 207
-
Enhancing Network Visibility and Security through Tensor AnalysisBaskaran, Muthu M. / Henretty, Thomas / Ezick, James / Lethin, Richard / Bruns-Smith, David et al. | 2019
- 216
-
An energy-efficient, QoS-aware and cost-effective scheduling approach for real-time workflow applications in cloud computing systems utilizing DVFS and approximate computationsStavrinides, Georgios L. / Karatza, Helen D. et al. | 2019
- 227
-
A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromiseNoor, Umara / Anwar, Zahid / Amjad, Tehmina / Choo, Kim-Kwang Raymond et al. | 2019
- 243
-
BIGSEA: A Big Data analytics platform for public transportation informationAlic, Andy S. / Almeida, Jussara / Aloisio, Giovanni / Andrade, Nazareno / Antunes, Nuno / Ardagna, Danilo / Badia, Rosa M. / Basso, Tania / Blanquer, Ignacio / Braz, Tarciso et al. | 2019
- 270
-
Software defined network management for dynamic smart GRID trafficCokic, Mita / Seskar, Ivan et al. | 2019
- 283
-
Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensorsOrtiz-Martin, Lara / Picazo-Sanchez, Pablo / Peris-Lopez, Pedro / Tapiador, Juan / Schneider, Gerardo et al. | 2019
- 297
-
Missing data resilient decision-making for healthcare IoT through personalization: A case study on maternal healthAzimi, Iman / Pahikkala, Tapio / Rahmani, Amir M. / Niela-Vilén, Hannakaisa / Axelin, Anna / Liljeberg, Pasi et al. | 2019
- 309
-
MCA-V2I: A Multi-hop Clustering Approach over Vehicle-to-Internet communication for improving VANETs performancesSenouci, Oussama / Aliouat, Zibouda / Harous, Saad et al. | 2019
- 324
-
Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systemsMeng, Shunmei / Qi, Lianyong / Li, Qianmu / Lin, Wenmin / Xu, Xiaolong / Wan, Shaohua et al. | 2019
- 336
-
Energy-efficient crypto acceleration with HW/SW co-design for HTTPSXiao, Chunhua / Zhang, Lei / Liu, Weichen / Bergmann, Neil / Xie, Yuhua et al. | 2019
- 348
-
Reducing the price of resource provisioning using EC2 spot instances with prediction modelsFabra, Javier / Ezpeleta, Joaquín / Álvarez, Pedro et al. | 2019
- 368
-
PAU: Privacy Assessment method with Uncertainty consideration for cloud-based vehicular networksFeng, Xia / Wang, Liangmin et al. | 2019
- 376
-
One secure data integrity verification scheme for cloud storageFan, Yongkai / Lin, Xiaodong / Tan, Gang / Zhang, Yuqing / Dong, Wei / Lei, Jing et al. | 2019
- 386
-
Action recognition using optimized deep autoencoder and CNN for surveillance data streams of non-stationary environmentsUllah, Amin / Muhammad, Khan / Haq, Ijaz Ul / Baik, Sung Wook et al. | 2019
- 398
-
Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized HadoopBabar, Muhammad / Arif, Fahim / Jan, Mian Ahmad / Tan, Zhiyuan / Khan, Fazlullah et al. | 2019
- 410
-
LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoTAghili, Seyed Farhad / Mala, Hamid / Shojafar, Mohammad / Peris-Lopez, Pedro et al. | 2019
- 425
-
DEED: Dynamic Energy-Efficient Data offloading for IoT applications under unstable channel conditionsYan, Hui / Zhang, Xiongtao / Chen, Huangke / Zhou, Yun / Bao, Weidong / Yang, Laurence T. et al. | 2019
- 438
-
A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of ThingsHe, Yu / Han, Guangjie / Wang, Hao / Adu Ansere, James / Zhang, Whenbo et al. | 2019
- 449
-
A self-managed Mesos cluster for data analytics with QoS guaranteesLópez-Huguet, Sergio / Pérez, Alfonso / Calatrava, Amanda / de Alfonso, Carlos / Caballer, Miguel / Moltó, Germán / Blanquer, Ignacio et al. | 2019
- 462
-
Page-sharing-based virtual machine packing with multi-resource constraints to reduce network traffic in migration for cloudsLi, Huixi / Li, Wenjun / Zhang, Shigeng / Wang, Haodong / Pan, Yi / Wang, Jianxin et al. | 2019
- 472
-
Intelligent distributed routing scheme based on social similarity for mobile social networksXu, Fang / Xu, Qiong / Xiong, Zenggang / Xiao, Nan / Xie, Yong / Deng, Min / Hao, Huibing et al. | 2019
- 481
-
Designing collaborative blockchained signature-based intrusion detection in IoT environmentsLi, Wenjuan / Tug, Steven / Meng, Weizhi / Wang, Yu et al. | 2019
- 490
-
Quality of Service (QoS)-driven resource provisioning for large-scale graph processing in cloud computing environments: Graph Processing-as-a-Service (GPaaS)Heidari, Safiollah / Buyya, Rajkumar et al. | 2019
- 502
-
Evolving graph construction for successive recommendation in event-based social networksLiu, Shenghao / Wang, Bang / Xu, Minghua / Yang, Laurence T. et al. | 2019
- 515
-
Fork-free hybrid consensus with flexible Proof-of-ActivityLiu, Zhiqiang / Tang, Shuyang / Chow, Sherman S.M. / Liu, Zhen / Long, Yu et al. | 2019
- 525
-
Bayesian network based weighted APT attack paths modeling in cloud computingZimba, Aaron / Chen, Hongsong / Wang, Zhaoshun et al. | 2019
- 538
-
A reliable adaptive forwarding approach in named data networkingRezaeifar, Zeinab / Wang, Jian / Oh, Heekuck / Lee, Suk-Bok / Hur, Junbeom et al. | 2018
- 552
-
Performance analysis of machine learning classifiers on improved concept vector space modelsKastrati, Zenun / Imran, Ali Shariq et al. | 2019
- 563
-
Towards interactive networking: Runtime message inference approach for incompatible protocol updates in IoT environmentsSon, Heesuk / Lee, Dongman et al. | 2019
- 579
-
IoT-enabled smart grid via SM: An overviewAl-Turjman, Fadi / Abujubbeh, Mohammad et al. | 2019
- 591
-
Mobile-aware service function chain migration in cloud–fog computingZhao, Dongcheng / Sun, Gang / Liao, Dan / Xu, Shizhong / Chang, Victor et al. | 2019
- 605
-
BTEM: Belief based trust evaluation mechanism for Wireless Sensor NetworksAnwar, Raja Waseem / Zainal, Anazida / Outay, Fatma / Yasar, Ansar / Iqbal, Saleem et al. | 2019
- 617
-
Power law based foundation for the measurement of discrimination information for human knowledge representationXu, Zheng / Luo, Xiangfeng / Liu, Yunhuai / Mei, Lin / Hu, Chuanping et al. | 2016
- 628
-
Determinants of behavioral intention to use the Personalized Location-based Mobile Tourism Application: An empirical study by integrating TAM with ISSMChen, Chia-Chen / Tsai, Jia-Lun et al. | 2017
- 639
-
User role identification based on social behavior and networking analysis for information disseminationZhou, Xiaokang / Wu, Bo / Jin, Qun et al. | 2017
- 649
-
Immersive human–computer interactive virtual environment using large-scale display systemWang, Xiuhui / Yan, Ke et al. | 2017
- 660
-
A user experience environment model for human activity simulationKo, Ilju / Kim, Dongho / Park, Jong Hyuk et al. | 2017
- 667
-
Multi-lingual geoparsing based on machine translationChen, Xu / Gelernter, Judith / Zhang, Han / Liu, Jin et al. | 2017
- 678
-
A review of the smart worldLiu, Hong / Ning, Huansheng / Mu, Qitao / Zheng, Yumei / Zeng, Jing / Yang, Laurence T. / Huang, Runhe / Ma, Jianhua et al. | 2017
- 692
-
Modeling public mood and emotion: Blog and news sentiment and socio-economic phenomenaChen, Mu-Yen / Chen, Ting-Hsuan et al. | 2017
- 700
-
An integrated approach for intrinsic plagiarism detectionAlSallal, Muna / Iqbal, Rahat / Palade, Vasile / Amin, Saad / Chang, Victor et al. | 2017
- 713
-
Combining humans and machines for the future: A novel procedure to predict human interestAhmed, Tanveer / Srivastava, Abhishek et al. | 2018
- 731
-
Implementation of an Intelligent Indoor Environmental Monitoring and management system in cloudYang, Chao-Tung / Chen, Shuo-Tsung / Den, Walter / Wang, Yun-Ting / Kristiani, Endah et al. | 2018
- ii
-
Editorial Board| 2019