A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Intrusion Detection Techniques in Cloud Computing: A Review
2018
International Journal of Computer Applications
In this paper a review of cloud-based intrusion detection system was provided. ...
Based on the review open problems and research direction in cloud intrusion detection was provided. General Terms Review ...
Research work in cloud-based IDS has employed both static and dynamic approach for normal profile creation. ...
doi:10.5120/ijca2018916139
fatcat:afazs54iknd2veot4r5w7tsuzq
State of the Art Intrusion Detection System for Cloud Computing
2022
International Journal of Communication Networks and Information Security
in cloud computing systems. ...
The term Cloud computing is not new anymore in computing technology. ...
static strategy. ...
doi:10.17762/ijcnis.v10i3.3590
fatcat:xu3wo6ncbvcb3lvgo4obvijkki
Software development environments on the web
2012
Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software - Onward! '12
For software development, the Web presents a shift away from developer workstations as a silo, and has the promise of closer collaboration and improved feedback through innovations in Web-based interactive ...
development environments (IDEs). ...
We would like to thank Molham Aref, Martin Bravenboer, Shan Shan Huang (LogicBlox), and Rik Arends (Cloud9) for our discussions about software development on the web. ...
doi:10.1145/2384592.2384603
dblp:conf/oopsla/KatsVKV12
fatcat:otaopqstuvd2jchq3nmhbvpbyu
Towards Immediate Feedback for Security Relevant Code in Development Environments
[article]
2022
arXiv
pre-print
To support developers in their tasks of developing secure code, we present an approach for providing them with continuous immediate feedback of SAST tools in integrated development environments (IDEs). ...
A common practice in software development is the use of static application security testing (SAST) tools to analyze code regarding security vulnerabilities. ...
Eclipse CogniCrypt 10 is an open-source platform for static code analysis based on CrySL rules [6] . ...
arXiv:2207.03225v1
fatcat:infdsqmr7jew3k5vrnppicmcwa
Cooperative Trust Framework for Cloud Computing Based on Mobile Agents
2015
International Journal of Communication Networks and Information Security
Our Hybrid IDS is based on two types of IDS, the first is for the detection of attacks at the level of virtual machines (VMs). The second is for the network attack detection and Mobile Agents. ...
In this paper, we develop a collaborative approach based on Hy-IDS and Mobile Agents in Cloud Environment, to define a dynamic context which enables the detection of new attacks, with much detail as possible ...
in the Figure.5) to Analyser Agent in IDS-C. ...
dblp:journals/ijcnis/ToumiTMET15
fatcat:7tyyedjozvbdzgzsjwn5ojikz4
Building MDE Cloud Services with Distil
2015
ACM/IEEE International Conference on Model Driven Engineering Languages and Systems
We illustrate the approach through the construction of a repository and a set of cloud-based services for bent ō reusable transformation components. ...
In order to alleviate this situation, we present DISTIL, a domain-specific language to describe MDE services, which is able to generate (NoSQL-based) respositories for the artefacts of interest, and skeletons ...
For example, AToMPM [6] offers a complete cloud-based modelling environment, while Hypersonic [1] is a cloud-based tool to perform model analysis. ...
dblp:conf/models/ManzanaresCL15
fatcat:jvvnfl6rq5etvpjmt3qtdax53m
Modelling and managing deployment costs of microservice-based cloud applications
2016
Proceedings of the 9th International Conference on Utility and Cloud Computing - UCC '16
CostHat is based on a network model, and allows for what-if and cost sensitivity analysis. ...
Our model, which we dubbed CostHat, supports both, Microservices deployed on traditional IaaS or PaaS clouds, and services that make use of novel cloud programming paradigms, such as AWS Lambda. ...
executions of the application; while technically not trivial, tools that support this kind of service dependency mining exist (e.g., Dynatrace); (2) prior to deployment, by statically analysing the source ...
doi:10.1145/2996890.2996901
dblp:conf/ucc/LeitnerCS16
fatcat:z3kzeupq5vaolefotfjv6hs7cy
A Novel Framework for Video Delivery to Handheld Devices using Cloud Environment
2019
International Journal of Engineering and Advanced Technology
The novel framework was tested with the cloud environment, within our parametric boundary it provide smooth streaming services to the handheld devices. ...
Handheld devices are responsible for most of the internet traffic nowadays. Video streaming services plays a vital role in internet traffic because of its increasing size and high definition. ...
The static Id was permanently stored in a server Data Base (DB) with the unique username as a key. ...
doi:10.35940/ijeat.b4042.129219
fatcat:ubwbnamq7bbmdji3p6g2cupbke
A Proactive Cloud Management Architecture for Private Clouds
2013
2013 IEEE Sixth International Conference on Cloud Computing
the current status of the cloud, supporting optimal decision making; and a Calendar-based Data Storage Model to reduce the storage required for cloud metric data and increase analysis performance. ...
A proactive response to cloud events is generated based on statistical analysis of historical metrics and predicted usage. ...
Its Virtual Placement and Balancing solution automatically optimises cloud resource usage based on both statical and optimisation techniques. Beside industrial solutions, Sotomayor et al. ...
doi:10.1109/cloud.2013.19
dblp:conf/IEEEcloud/DongH13
fatcat:ngpxw53ug5bghjemeeyk4pqb4u
Utilising stream reasoning techniques to underpin an autonomous framework for cloud application platforms
2014
Journal of Cloud Computing: Advances, Systems and Applications
with static ontological knowledge and apply intelligent reasoning. ...
cloud providers is to develop appropriate mechanisms for run-time monitoring and adaptation, to prevent cloud application platforms from quickly dissolving into a non-reliable environment. ...
This separation of concerns allows for seamless and transparent modification of the analysis rules constituting the static knowledge base. • Support for expressive queries and complex schemas:
Figure ...
doi:10.1186/s13677-014-0013-5
fatcat:77lksagfjba6bibgfpw3gbwsru
REAL WORKLOAD CHARACTERIZATION AND SYNTHETIC WORKLOAD GENERATION
2016
International Journal of Research in Engineering and Technology
Synthetic workloads are generated based on our experiments. The real trace is downloaded from Google cluster data which consists of two workloads. ...
paper we are analyzing the Google cluster data version 2 trace in IBM SPSS statistics and generating another workload called synthetic workload with the same characteristics and behavior of real workload based ...
Some of research based cloud simulator are Cloud Sim, Green Cloud, and GroudSim [1] . ...
doi:10.15623/ijret.2016.0505080
fatcat:ntjlbkcma5cutkaxjczz42754m
Intrusion Detection and Marking Transactions in a Cloud of Databases Environment
2016
International Journal on Cloud Computing Services and Architecture
The cloud computing is a paradigm for large scale distributed computing that includes several existing technologies. ...
In this context, we propose an intrusion detection and marking transactions for a cloud of database environment. ...
The unification of transaction based application in these environments present a set of threats that can target a cloud of database environment. ...
doi:10.5121/ijccsa.2016.6502
fatcat:omwrqhe6ojdpjpfwckzghhlfve
Using ATL Transformation Services in the MDEForge Collaborative Modeling Platform
[chapter]
2016
Lecture Notes in Computer Science
This demo paper illustrates the extensibility of MDEForge by integrating ATL services for the remote execution, automated testing, and static analysis of ATL transformations. ...
Harnessing the softwareas-a-service (SaaS) paradigm and shifting applications from local, mono-core implementations to cloud-based architectures is key to enhance scalability and flexibility. ...
The analysis service uses anATLyzer [10] , a static analyser for ATL able to detect over 40 types of errors statically (e.g., rule conflicts, unresolved bindings, uninitialized features). ...
doi:10.1007/978-3-319-42064-6_5
fatcat:2ompuqrarjcn7mj5yqulsjxq44
Re-provisioning of Cloud-Based Execution Infrastructure Using the Cloud-Aware Provenance to Facilitate Scientific Workflow Execution Reproducibility
[chapter]
2016
Communications in Computer and Information Science
2016) Re-provisioning of cloud-based execution infrastructure using the cloudaware provenance to facilitate scientific workflow execution repro- ...
Besides this, the support provided by OSDC by o↵ering a free Cloud infrastructure of 20 cores is highly appreciated. ...
[15, 16] ) performed to capture provenance in the Cloud. However, they lack the support for workflow reproducibility. ...
doi:10.1007/978-3-319-29582-4_5
fatcat:j44fx7txsbea5atvv342x3b64a
PolicyCloud D2.5 STATE OF THE ART & REQUIREMENTS ANALYSIS M22
2021
Zenodo
Licence/Privacy It can be imported in PolicyCLOUD Data type Structural Type of Process static (Stream or Static data)
TABLE 71 71 -DATASET REQUIREMENT FOR DS-IIPDD-04 Section Description ID DS-IIPDD ...
option for businesses in the cloud market. ...
management, enabling public authorities and stakeholders to create, analyse, evaluate and optimize policies based on the "fresh" data, the information that can be continuously collected by citizens and ...
doi:10.5281/zenodo.6043823
fatcat:fuf7egsgfvea3ky5it2wpmt4ha
« Previous
Showing results 1 — 15 out of 17,016 results