Filters








6,179 Hits in 4.8 sec

Rapidly Adjustable Non-intrusive Online Monitoring for Multi-core Systems [chapter]

Normann Decker, Philip Gottschling, Christian Hochberger, Martin Leucker, Torben Scheffel, Malte Schmitz, Alexander Weiss
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This paper presents an approach for rapidly adjustable embedded trace online monitoring of multi-core systems, called RETOM.  ...  Today, most commercial multi-core SoCs provide accurate runtime information through an embedded trace unit without affecting program execution.  ...  We thank Jannis Harder and Sebastian Hungerecker for their work on TeSSLa, its compiler and the case study.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-70848-5_12">doi:10.1007/978-3-319-70848-5_12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ejtphr7w3zeh7obawxla2cqkee">fatcat:ejtphr7w3zeh7obawxla2cqkee</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180725153911/https://link.springer.com/content/pdf/10.1007%2F978-3-319-70848-5_12.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b4/8b/b48b0ed0621562eff325a529059793de01d57fbb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-70848-5_12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

An Energy-Aware Runtime Management of Multi-Core Sensory Swarms

Sungchan Kim, Hoeseok Yang
<span title="2017-08-24">2017</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
As today's sensory swarms are usually implemented using multi-core processors with adjustable clock frequency, we propose to monitor the CPU workload periodically and adjust the task-to-core allocation  ...  Hence, the model allows us to rapidly and accurately estimate the effect of the two control knobs, clock frequency adjustment and core allocation.  ...  [13] proposed an adaptive core allocation technique for multi-core NoCs (networks-on-chips) in reducing the network traffic online as a response to various hard-to-predict system scenario changes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s17091955">doi:10.3390/s17091955</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/28837094">pmid:28837094</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC5620963/">pmcid:PMC5620963</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vaxcwebrbzh3lmdaxcq52xonbm">fatcat:vaxcwebrbzh3lmdaxcq52xonbm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190504044310/https://res.mdpi.com/sensors/sensors-17-01955/article_deploy/sensors-17-01955-v2.pdf?filename=&amp;attachment=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ac/f0/acf04c7c62b1eb877dbca8b41e6c2c9926666421.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s17091955"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5620963" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Hardware-Based Runtime Verification with Embedded Tracing Units and Stream Processing [chapter]

Lukas Convent, Sebastian Hungerecker, Torben Scheffel, Malte Schmitz, Daniel Thoma, Alexander Weiss
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this tutorial, we present a comprehensive approach to nonintrusive monitoring of multi-core processors.  ...  Modern multi-core processors come with trace-ports that provide a highly compressed trace of the instructions executed by the processor.  ...  Figure 1 provides an overview of the proposed workflow based on our approach to rapidly adjustable embedded trace online monitoring.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-030-03769-7_5">doi:10.1007/978-3-030-03769-7_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bxgfjsyzpfbpfksid3gu54kfxq">fatcat:bxgfjsyzpfbpfksid3gu54kfxq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321090044/https://www.isp.uni-luebeck.de/sites/default/files/publications/rv2018-tutorial.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/25/c3/25c3847dab997b325fc6414fc58d723497f1b831.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-030-03769-7_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review

Selma Dilek, Hüseyin Cakır, Mustafa Aydın
<span title="2015-01-31">2015</span> <i title="Academy and Industry Research Collaboration Center (AIRCC)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dlcgzkn4cvbevhkswphjjxglsa" style="color: black;">International Journal of Artificial Intelligence &amp; Applications</a> </i> &nbsp;
Physical devices and human intervention are not sufficient for monitoring and protection of these infrastructures; hence, there is a need for more sophisticated cyber defense systems that need to be flexible  ...  Cyber infrastructures are highly vulnerable to intrusions and other threats.  ...  They presented a novel AIS-based intrusion prevention system (IPS) which uses intelligent multi-agent system for non-linear classification method to identify the abnormality behavior and detect, prevent  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5121/ijaia.2015.6102">doi:10.5121/ijaia.2015.6102</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r6cycqel5rcxpizuvejrllqxjq">fatcat:r6cycqel5rcxpizuvejrllqxjq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160328064237/http://airccse.org:80/journal/ijaia/papers/6115ijaia02.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f3/86/f3864908a5a800689395b077760ebd2bc5b8da32.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5121/ijaia.2015.6102"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Cyber-physical system security for networked industrial processes

Shuang Huang, Chun-Jie Zhou, Shuang-Hua Yang, Yuan-Qing Qin
<span title="2015-11-06">2015</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nvylz6fxhjaqtckvt4zfwob2qi" style="color: black;">International Journal of Automation and Computing</a> </i> &nbsp;
The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer.  ...  In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed.  ...  Along with the system operation, the security status of the system is dynamic. Thus, security impact assessment for an industrial CPS should be executed online and periodically.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11633-015-0923-9">doi:10.1007/s11633-015-0923-9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dzudgletdzhkhehunq6fm32bju">fatcat:dzudgletdzhkhehunq6fm32bju</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180724103519/https://link.springer.com/content/pdf/10.1007%2Fs11633-015-0923-9.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/25/08/250832c96d033b75ebd797975545c61a8ae3e7b8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11633-015-0923-9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Non-intrusive load decomposition based on CNN-LSTM hybrid deep learning model [article]

Xinxin Zhou, Jingru Feng, Yang Li
<span title="2021-09-02">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
For the purpose of improving the performance of non-intrusive load decomposition, a non-intrusive load decomposition method based on a hybrid deep learning model is proposed.  ...  Experimental results on the open dataset UK-DALE show that the proposed algorithm improves the performance of the whole network system.  ...  Introduction As the goal of the future development of global power grids, smart grids have developed rapidly whether they are smart grids for large-scale systems or smart home devices for micro-systems  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2109.01236v1">arXiv:2109.01236v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hfwkyoek7rakdnm6mu4ntwbel4">fatcat:hfwkyoek7rakdnm6mu4ntwbel4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210910085604/https://arxiv.org/ftp/arxiv/papers/2109/2109.01236.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0c/77/0c77262f2aa2e0c0544ecf1dad70dcbb69910a82.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2109.01236v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Optimizing capacity allocation for big data applications in cloud datacenters

Sebastiano Spicuglia, Lydia Y. Chen, Robert Birke, Walter Binder
<span title="">2015</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5epkbpsj6fglfagfpxolfrllsi" style="color: black;">2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)</a> </i> &nbsp;
The control algorithm of OptiCA distributes the available core budget across co-executed applications and components, based on their "effective" demands obtained through non-intrusive profiling.  ...  To operate systems cost-effectively, cloud providers not only multiplex applications on the shared infrastructure but also dynamically allocate available resources, such as power and cores.  ...  MROrchestrator [19] is a resource manager that monitors online the performance of each node, such that performance bottlenecks of MapReduce tasks can be detected to adjust resource allocations, such  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/inm.2015.7140330">doi:10.1109/inm.2015.7140330</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/im/SpicugliaCBB15.html">dblp:conf/im/SpicugliaCBB15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/smzevmq27rhuvfcoeonncdxoma">fatcat:smzevmq27rhuvfcoeonncdxoma</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150922062322/http://dl.ifip.org/db/conf/im/im2015m/137413.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/94/30/94303c1f4f6f13a8e4c5f400e54f51cb2dbc585e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/inm.2015.7140330"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Anomaly Detection Based on Multiple Streams Clustering for Train Real-Time Ethernet

<span title="2021-08-01">2021</span> <i title="Mechanical Engineering Faculty in Slavonski Brod"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/t73uxenjnncj3pwpreqsfuzkyi" style="color: black;">Tehnički Vjesnik</a> </i> &nbsp;
Therefore, we propose a train real-time Ethernet anomaly detection system (TREADS).  ...  In the experiment, the reliability of TREADS is tested based on the TRDP data set collected from the real network environment, and the models of anomaly detection algorithms are established for evaluation  ...  Network Performance Monitoring Module Network performance monitoring module is one of the core modules of the system.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17559/tv-20210414030120">doi:10.17559/tv-20210414030120</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7pemuhm2dfdqxegl4dqlx6ai6e">fatcat:7pemuhm2dfdqxegl4dqlx6ai6e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210726200005/https://hrcak.srce.hr/file/379505" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a0/6c/a06c782f9e0599d48a175b01e6cbf224274de104.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17559/tv-20210414030120"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Bridging Data in the Clouds: An Environment-Aware System for Geographically Distributed Data Transfers

Radu Tudoran, Alexandru Costan, Rui Wang, Luc Bouge, Gabriel Antoniu
<span title="">2014</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ujjptpi7mjgmfdad3mk3fcer3y" style="color: black;">2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing</a> </i> &nbsp;
Our solution is environmentaware, as it monitors and models the global cloud infrastructure, and offers predictable data handling performance for transfer cost and time.  ...  In this work, we propose a uniform data management system for scientific applications running across geographically distributed sites.  ...  The authors would like to thank the Azure support teams from ATL Europe for their valuable input and feedback.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ccgrid.2014.86">doi:10.1109/ccgrid.2014.86</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccgrid/TudoranCWBA14.html">dblp:conf/ccgrid/TudoranCWBA14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gzzznyag7rbvzlf3qfgi7nvhj4">fatcat:gzzznyag7rbvzlf3qfgi7nvhj4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170923214914/https://hal.inria.fr/hal-00978153/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e2/5f/e25fd9969b9838a632f407d23c9942a0850d83c4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ccgrid.2014.86"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Systematic State-of-The-Art Analysis of Multi-Agent Intrusion Detection

I. A. Saeed, A. Selamat, M. Rohani, O. Krejcar, J. Chaudhry
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
We are also grateful for the support of Ph.D. student Sebastien Mambou in for consultations regarding application aspects.  ...  Host-based IDS is used for monitoring and analyzing the internal computer system state [12] , while network-based IDS is to monitor and analyze the external computer system state(network traffic) [13  ...  False responses and non-response rates were used for evaluating the learning, collaboration, and adaptation capacities of the distributed multi-agent intrusion detection architecture by [48] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3027463">doi:10.1109/access.2020.3027463</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vaudgewisnhihghc4f3xa3otby">fatcat:vaudgewisnhihghc4f3xa3otby</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200930194205/https://ieeexplore.ieee.org/ielx7/6287639/6514899/09207913.pdf?tp=&amp;arnumber=9207913&amp;isnumber=6514899&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/09/5c/095c3a76a3601918dfd1bdc608b6470b43bda4d6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3027463"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

An Online Ensemble Learning Model for Detecting Attacks in Wireless Sensor Networks [article]

Hiba Tabbaa, Samir Ifzarne, Imad Hafidi
<span title="2022-04-28">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
WSN applications are extremely critical, it is essential to build reliable solutions that involve fast and continuous mechanisms for online data stream analysis enabling the detection of attacks and intrusions  ...  In this context, our aim is to develop an intelligent, efficient, and updatable intrusion detection system by applying an important machine learning concept known as ensemble learning in order to improve  ...  Wireless Sensor Networks (WSN) is another rapidly developing technology that is employed in IoT systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2204.13814v1">arXiv:2204.13814v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gtydljd3jnaelau2uv3osnh5e4">fatcat:gtydljd3jnaelau2uv3osnh5e4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220503112423/https://arxiv.org/pdf/2204.13814v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/89/dc/89dc86b634a07ac8ca3401b5ef5e37368496c482.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2204.13814v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

DoLen: User-Side Multi-cloud Application Monitoring

Do Le Quoc, Lenar Yazdanov, Christof Fetzer
<span title="">2014</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yb5wso5k5je2jm3wyablyq665y" style="color: black;">2014 International Conference on Future Internet of Things and Cloud</a> </i> &nbsp;
Monitoring the performance and behavior of multi-cloud applications in a scenario where applications are deployed on multiple cloud providers is a challenge for cloud computing research community.  ...  In this paper, we propose a framework that allows monitoring in near real-time resource utilization including CPU, memory, disk activity and network traffic of applications deployed in multiple clouds.  ...  For example, RESERVOIR 5 presents the Lattice non-intrusive framework for monitoring cloud applications and VISION Cloud 6 introduces a monitoring framework that allows aggregating events, and applying  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ficloud.2014.22">doi:10.1109/ficloud.2014.22</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ficloud/QuocYF14.html">dblp:conf/ficloud/QuocYF14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bpukonfdfra6xddgdvjeeafg7u">fatcat:bpukonfdfra6xddgdvjeeafg7u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170811230446/http://www.chinacloud.cn/upload/2014-06/14062712213353.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6a/75/6a75bf50cc5ba48eda5346fedace28426d07a460.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ficloud.2014.22"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Construction and Management of Astronomical Big Data Analysis and Multi-dimensional Information Visualization Platform

Yang Zherui, Gao Na, Liu Liang
<span title="">2020</span> <i title="Science Publishing Group"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ia7snuhncbauldbba7fviqmz2m" style="color: black;">American Journal of Information Science and Technology</a> </i> &nbsp;
The use of user-friendly, centralized cluster management software, the deployment of proprietary environmental control settings and multi-dimensional visualization of safety management systems form a multi-level  ...  parallel computing architecture, and a variety of physical software tools for astronomical applications.  ...  The external of the cabinets is equipped with a remote video monitoring system, SMS alarm system, firewall and intrusion prevention system, etc.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11648/j.ajist.20200402.12">doi:10.11648/j.ajist.20200402.12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kqbxb6uchjcjfad7ihozz4xzmq">fatcat:kqbxb6uchjcjfad7ihozz4xzmq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201103234855/http://article.sciencepublishinggroup.com/pdf/10.11648.j.ajist.20200402.12.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0e/12/0e12ec45df8795864b5351c1cfd568b721aae78a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11648/j.ajist.20200402.12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Online Anomaly Detection Based on Support Vector Clustering

Mohammad Amin Adibi, Jamal Shahrabi
<span title="2015-06-15">2015</span> <i title="Atlantis Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wjdkfhqywrdefeqoyzjz3os76i" style="color: black;">International Journal of Computational Intelligence Systems</a> </i> &nbsp;
A two-phase online anomaly detection method based on support vector clustering (SVC) in the presence of non-stationary data is developed in this paper which permits arbitrary-shaped data clusters to be  ...  Then the current model dynamically evolves to match the rapidly changing real-world data.  ...  systems (IDS). 1 An IDS is a security tool that monitors all activity on a network and detects any attempts which may destroy confidentiality, integrity or availability of computer networks or systems  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1080/18756891.2015.1061393">doi:10.1080/18756891.2015.1061393</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/axfpw3f525c4xadh5npconprdm">fatcat:axfpw3f525c4xadh5npconprdm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722025914/https://download.atlantis-press.com/article/25868625/pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3d/43/3d4335f67d0eb9391001b750b605db70984ed861.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1080/18756891.2015.1061393"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A holistic approach to service survivability

Angelos D. Keromytis, Janak Parekh, Philip N. Gross, Gail Kaiser, Vishal Misra, Jason Nieh, Dan Rubenstein, Sal Stolfo
<span title="">2003</span> <i title="ACM Press"> Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems in association with 10th ACM Conference on Computer and Communications Security - SSRS &#39;03 </i> &nbsp;
Contrary to the ad hoc manner in which contemporary survivable systems are built-using isolated, independent security mechanisms such as firewalls, intrusion detection systems and software sandboxes-SABER  ...  integrates several different technologies in an attempt to provide a unified framework for responding to the wide range of attacks malicious insiders and outsiders can launch.  ...  Intrusion Detection Systems Surveillance Detection Security software must detect surveillance activities to counter the escalating sophistication and sheer prevalence of today's online attack procedures  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1036921.1036923">doi:10.1145/1036921.1036923</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gyq7mdscyjeuhjjm4ngr4vbp4i">fatcat:gyq7mdscyjeuhjjm4ngr4vbp4i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706094734/http://www1.cs.columbia.edu/~locasto/projects/candidacy/papers/saber.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bf/28/bf28f7a0b8e389facf8cf498892dcc5456ea0c1e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1036921.1036923"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 6,179 results