Nye registreringer

  • A Configurable and Executable Model of Spark Streaming on Apache YARN 

    Lin, Jia-Chun; Lee, Ming-Chang; Yu, Ingrid Chieh; Johnsen, Einar Broch (Peer reviewed; Journal article, 2020)
    Abstract: Streams of data are produced today at an unprecedented scale. Efficient and stable processing of these streams requires a careful interplay between the parameters of the streaming application and of the underlying ...
  • ReRe: A Lightweight Real-time Ready-to-Go Anomaly Detection Approach for Time Series 

    Lee, Ming-Chang; Lin, Jia-Chun; Gran, Ernst Gunnar (Chapter, 2020)
    Anomaly detection is an active research topic in many different fields such as intrusion detection, network monitoring, system health monitoring, IoT healthcare, etc. However, many existing anomaly detection approaches ...
  • RePAD: Real-time Proactive Anomaly Detection for Time Series 

    Lee, Ming-Chang (Chapter, 2020)
    During the past decade, many anomaly detection approaches have been introduced in different fields such as network monitoring, fraud detection, and intrusion detection. However, they require understanding of data pattern ...
  • Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomalies 

    Khan, Muhammad Imran; Foley, Simon N.; O'Sullivan, Barry (Peer reviewed; Journal article, 2020)
    In this paper a notion of privacy-anomaly detection is presented where normative privacy is modelled using k-anonymity. Based on the model, normative privacy-profiles are constructed, and deviation from normative privacy-profile ...
  • Intelligent mobile malware detection using permission requests and API calls 

    Alazab, Moutaz; Alazab, Mamoun; Shalaginov, Andrii; Mesleh, Abdelwadood; Awajan, Albara (Peer reviewed; Journal article, 2020)
    Malware is a serious threat that has been used to target mobile devices since its inception. Two types of mobile malware attacks are standalone: fraudulent mobile apps and injected malicious apps. Defending against the ...
  • Hybrid Context-aware Message Flooding for Dead Spot Mitigation in V2I Communication 

    Puka, Ergys; Herrmann, Peter; Taherkordi, Amirhosein (Peer reviewed; Journal article, 2020)
    An often overlooked practical problem in Intelligent Transportation Systems (ITS) is the presence of areas without cellular network connectivity, so-called dead spots, which aggravates the communication between vehicles ...
  • Identifying and Analyzing Dependencies in and among Complex Cyber Physical Systems 

    Akbarzadeh, Aida; Katsikas, Sokratis K. (Peer reviewed; Journal article, 2021)
    Contemporary Critical Infrastructures (CIs), such as the power grid, comprise cyber physical systems that are tightly coupled, to form a complex system of interconnected components with interacting dependencies. Modelling ...
  • Exploring the Computational Cost of Machine Learning at the Edge for Human-Centric Internet of Things 

    Gómez-Carmona, Oihane; Casado Mansilla, Diego; Kraemer, Frank Alexander; Lopez-de-Ipina, Diego; Garcia-Zubia, Javier (Peer reviewed; Journal article, 2020)
    In response to users’ demand for privacy, trust and control over their data, executing machine learning tasks at the edge of the system has the potential to make the Internet of Things (IoT) applications and services more ...
  • Identity management on blockchain – privacy and security aspects 

    Panait, Andreea Elena; Olimid, Ruxandra-Florentina; Stefanescu, Alin (Peer reviewed; Journal article, 2020)
    In the last years, identity management solutions on blockchain were proposed as a possible solution to digital identity management problems. However, they are still at an early stage, and further research needs to be done ...
  • Linking QoE and Performance Models for DASH-based Video Streaming 

    Schwarzmann, Susanna; Zinner, Thomas (Chapter, 2020)
    HTTP Adaptive Streaming (HAS) is the de-facto standard for video delivery over the Internet. Splitting the video clip into small segments and providing multiple quality levels per segment allows the client to dynamically ...
  • Comparing fixed and variable segment durations for adaptive video streaming: a holistic analysis 

    Schwarzmann, Susanna; Hainke, Nick; Zinner, Thomas; Sieber, Christian; Robitza, Werner; Raake, Alexander (Chapter, 2020)
    HTTP Adaptive Streaming (HAS) is the de-facto standard for video delivery over the Internet. It enables dynamic adaptation of video quality by splitting a video into small segments and providing multiple quality levels per ...
  • P4CONSIST: Towards Consistent P4 SDNs 

    Shukla, Apoorv; Fathalli, Seifeddine; Zinner, Thomas; Hecker, Artur; Schmid, Stefan (Peer reviewed; Journal article, 2020)
    The prevailing wisdom is that a software-defined network (SDN) operates under the premise that the logically centralized control plane has an accurate representation of the actual data plane state. Unfortunately, bugs, ...
  • A Modern View on Forward Security 

    Boyd, Colin Alexander; Gellert, Kai (Peer reviewed; Journal article, 2020)
    Forward security ensures that compromise of entities today does not impact the security of cryptographic primitives employed in the past. Such a form of security is regarded as increasingly important in the modern world ...
  • Resilience Analysis of Software-Defined Networks Using Queueing Networks 

    Nweke, Livinus Obiora; Wolthusen, Stephen (Chapter, 2020)
    Software-Defined Networks (SDN) are being adopted widely and are also likely to be deployed as the infrastructure of systems with critical real-time properties such as Industrial Control Systems (ICS). This raises the ...
  • Accuracy vs. Cost Trade-off for Machine Learning Based QoE Estimation in 5G Networks 

    Schwarzmann, Susanna; Marquezan, Clarissa Cassales; Trivisonno, Riccardo; Nakajima, Shinichi; Zinner, Thomas (Chapter, 2020)
    Since their first release, 5G systems have been enhanced with Network Data Analytics Functionalities (NWDAF) as well as with the ability to interact with 3rd parties' Application Functions (AFs). Such capabilities enable ...
  • Difficult SQLi Code Patterns for Static Code Analysis Tools 

    Schuckert, Felix; Katt, Basel; Langweg, Hanno (Peer reviewed; Journal article, 2020)
    We compared vulnerable and xed versions of the source code of 50 dierent PHP open source projects based on CVE reports for SQL injection vulnerabilities. We scanned the source code with commercial and open source tools for ...
  • Constrained Approximate Search Algorithms in Knowledge Discovery 

    Petrovic, Slobodan; Sidorova, Julia (Journal article, 2020)
    Knowledge discovery in big data is one of the most important applications of computing machinery today. Search is essential part of all such procedures. Search algorithms must be extremely efficient, but at the same time ...
  • Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation 

    Amro, Ahmed Walid; Gkioulos, Vasileios; Katsikas, Sokratis (Chapter, 2020)
    Recent innovations in the smart city domain include new autonomous transportation solutions such as buses and cars, while Autonomous Passenger Ships (APS) are being considered for carrying passengers across urban waterways. ...
  • Applications of an Online Audience Response System in Different Academic Settings: An Empirical Study 

    Amro, Ahmed Walid; Yamin, Muhammad Mudassar; Knox, Benjamin James (Peer reviewed; Journal article, 2020)
    Technology dependent, digitally innate students are joining academia. Consequently, traditional pedagogical techniques for achieving desired learning outcomes are not universally sufficient. Digital clickers were introduced ...
  • Using informed access network selection to improve HTTP adaptive streaming performance 

    Enghardt, Theresa; Zinner, Thomas; Feldmann, Anja (Chapter, 2020)
    As end-user devices often have multiple access networks available, choosing the most suitable network can help to improve application performance and user experience. However, selecting the best access network for HTTP ...

Vis flere