X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (65) 65
Conference Proceeding (44) 44
Publication (11) 11
Book Chapter (7) 7
Book / eBook (3) 3
Magazine Article (1) 1
Web Resource (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cloud computing (28) 28
computer science, theory & methods (17) 17
security (17) 17
monitoring (15) 15
analysis (12) 12
computer science, information systems (12) 12
computer science (11) 11
game theory (9) 9
intrusion detection (9) 9
telecommunications (9) 9
bluetooth (7) 7
cloud federation (7) 7
computer architecture (7) 7
engineering, electrical & electronic (7) 7
infrastructure (7) 7
middleware (7) 7
computation (6) 6
computer information security (6) 6
computer science, software engineering (6) 6
data security (6) 6
denial of service (6) 6
mathematical models (6) 6
reliability (6) 6
sensors (6) 6
artificial intelligence (5) 5
cloud security (5) 5
computer crime (5) 5
computer science, artificial intelligence (5) 5
computer science, hardware & architecture (5) 5
computer science, interdisciplinary applications (5) 5
computer security (5) 5
computer simulation (5) 5
energy consumption (5) 5
engineering (5) 5
internet (5) 5
intrusion tolerance (5) 5
position (5) 5
quality of service (5) 5
xml (5) 5
accuracy (4) 4
algorithms (4) 4
big data (4) 4
business (4) 4
calibration (4) 4
clouds (4) 4
complex event processing (4) 4
computational intelligence (4) 4
computer networks (4) 4
correlation (4) 4
diagnosis (4) 4
elasticity (4) 4
engines (4) 4
genetic algorithms (4) 4
global positioning system (4) 4
hla (4) 4
internet of things (4) 4
methods (4) 4
models (4) 4
probes (4) 4
publish/subscribe services (4) 4
safety and security measures (4) 4
servers (4) 4
simulation (4) 4
software (4) 4
usage (4) 4
wireless communication (4) 4
wireless networks (4) 4
algorithm analysis and problem complexity (3) 3
application software (3) 3
architecture (3) 3
cloud (3) 3
cloud elasticity (3) 3
computer communication networks (3) 3
computers (3) 3
conferences (3) 3
costs (3) 3
critical infrastructures (3) 3
customers (3) 3
cybersecurity (3) 3
decision making (3) 3
denial of service attacks (3) 3
emergency management (3) 3
environmental sciences (3) 3
gossiping (3) 3
homeland security (3) 3
hybrid simulation (3) 3
indoor (3) 3
indoor positioning (3) 3
information systems applications (3) 3
infrastruktur (3) 3
intrusion (3) 3
java (3) 3
localization (3) 3
low-rate attacks (3) 3
malware (3) 3
mission-critical applications (3) 3
mobile computing (3) 3
ontologies (3) 3
optimization (3) 3
protocols (3) 3
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


International Journal of High Performance Computing and Networking, ISSN 1740-0562, 2013, Volume 7, Issue 3, pp. 173 - 185
Cloud computing is a new business model, which represents an opportunity for users, companies, and public organisations to reduce costs and increase... 
Cloud computing | Correlation | Security | Intrusion detection | Complex event processing | CEP | Intrusion | Costs | Customers | Mathematical models | Computer information security | Business
Journal Article
Information Sciences, ISSN 0020-0255, 02/2019, Volume 476, pp. 474 - 490
Cloud paradigm is vulnerable to emerging breeds of fraudulent energy-related threats, which seek to exploit the cloud elasticity and the multi-tenant model.... 
fraudulent energy consumption | Cloud security | cloud elasticity | abusive migration | resource exhausting attacks | COMPUTER SCIENCE, INFORMATION SYSTEMS | Infrastructure (Economics) | Energy consumption | Fraud | Analysis
Journal Article
IEEE Transactions on Computers, ISSN 0018-9340, 08/2016, Volume 65, Issue 8, pp. 2348 - 2362
Journal Article
IEEE Communications Magazine, ISSN 0163-6804, 11/2017, Volume 55, Issue 11, pp. 98 - 104
Currently, our society is undergoing a radical change due to the increasing pervasive use of ICT within all of its processes. Such an evolution has been... 
Cloud computing | Sensors | Ecosystems | Computer architecture | Testing | Edge computing | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | Usage | Dynamic tests | Data management | Computer simulation | Sensing devices | Object recognition | Nodes
Journal Article
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2017, Volume 525, pp. 213 - 214
Conference Proceeding
Journal of Parallel and Distributed Computing, ISSN 0743-7315, 11/2019
Journal Article
09/2017, Intelligent data centric systems, ISBN 9780128113738, 368
eBook
Studies in Computational Intelligence, ISSN 1860-949X, 2016, Volume 616, p. 401
Journal Article
Personal and Ubiquitous Computing, ISSN 1617-4909, 2/2014, Volume 18, Issue 2, pp. 271 - 285
Journal Article
10/2018, Lecture Notes On Data Engineering and Communications Technologies (Volume 24), ISBN 9783030026066, Volume 24, 533
This book presents the latest research findings, as well as innovative theoretical and practical research results, methods and development techniques related... 
Computational grids (Computer systems)-Congresses | Parallel processing (Electronic computers)-Congresses | Peer-to-peer architecture (Computer networks)-Congresses
eBook
Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, 4/2016, Volume 7, Issue 2, pp. 149 - 151
To access, purchase, authenticate, or subscribe to the full-text of this article, please visit this link: http://dx.doi.org/10.1007/s12652-016-0348-5 
Artificial Intelligence (incl. Robotics) | Engineering | Computational Intelligence | User Interfaces and Human Computer Interaction | Robotics and Automation | COMPUTER SCIENCE, INFORMATION SYSTEMS | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | TELECOMMUNICATIONS
Journal Article
Sustainability (Switzerland), ISSN 2071-1050, 2014, Volume 6, Issue 9, pp. 5730 - 5744
Journal Article
Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, 4/2014, Volume 5, Issue 2, pp. 249 - 261
Journal Article
Knowledge-Based Systems, ISSN 0950-7051, 05/2015, Volume 79, pp. 3 - 17
Big Data analytics is considered an imperative aspect to be further improved in order to increase the operating margin of both public and private enterprises,... 
Big Data analytics | Schema matching | Semantic search | Complex event processing | Ontologies | Publish/subscribe services | Interoperability | ALGORITHM | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | Big data | Productivity | Heterogeneity | Platforms | Semantics | Knowledge base | Dealing | Analytics | Streams
Journal Article
IEEE Transactions on Cloud Computing, ISSN 2168-7161, 01/2015, Volume 3, Issue 1, pp. 80 - 94
The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. According to this paradigm, the effects of Denial of... 
Degradation | Availability | Cloud computing | XML | Quality of service | Servers | Computer crime | sophisticated attacks strategy | low-rate attacks | intrusion detection | REDUCTION | DDOS ATTACKS | COMPUTER SCIENCE, INFORMATION SYSTEMS | DOS | COMPUTER SCIENCE, THEORY & METHODS | QUALITY ROQ ATTACKS
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 01/2018, Volume 78, pp. 343 - 352
Elasticity is a key feature in cloud computing, which distinguishes this paradigm from other ones, such as cluster and grid computing. On the other hand,... 
Game Theory | Elasticity | Fuzzy linguistic SLA | Cloud computing | Live-migration | Coral-reefs optimization | COMPUTER SCIENCE, THEORY & METHODS | COLONY | Consumption (Economics) | Reefs | Game theory | Analysis | Resource allocation | Computer science
Journal Article
International Journal of Data Warehousing and Mining, ISSN 1548-3924, 01/2016, Volume 12, Issue 1, pp. 49 - 68
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.