The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Malware classification for the Android ecosystem can be performed using a range of techniques. One major technique that has been gaining ground recently is dynamic analysis based on system call invocations recorded during the executions of Android applications. Dynamic analysis has traditionally been based on converting system calls into flat feature vectors and feeding the vectors into machine learning...
A novel paradigm to detect smartphone physical capture attacks is proposed. Using received signal strength indicator and general system problem solving framework, the paradigm recognizes indoors moving pattern of a phone user. Most existing approaches in detection of physical capture attacks focus on protecting the network not the device. This paradigm concentrates primarily on safeguarding the security...
Job scheduling is a necessary prerequisite for performance optimization and resource management in the cloud computing system. Focusing on accurate scaled cloud computing environment and efficient job scheduling under Virtual Machine (VM) resource and Server Level Agreement (SLA) constraints, we introduce the architecture of cloud computing platform and optimization job scheduling scheme in this study...
The multimedia big data in multimedia sensing and other IoT (Internet of Things) systems are high-volume, real-time, dynamic and heterogeneous. These characteristics lead to new challenges of data security. When computation and power resources in some IoT nodes are very scarce, these challenges become more serious that complex data security process on multimedia data is restricted by the aforementioned...
With the rapid increase of mobile devices, the computing load of roadside cloudlets is fast growing. When the computation tasks of the roadside cloudlet reach the limit, the overload may generate heat radiation problem and unacceptable delay to mobile users. In this paper, we leverage the characteristics of buses and propose a scalable fog computing paradigm with servicing offloading in bus networks...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
As a recent emerging industry, cybersecurity insurance has been growing ambitiously fast, which mainly serves the financial industry and assists financial firms to reduce cybersecurity risks. Understanding the risk classification is an important hemisphere for operating cybersecurity insurance. However, the classification representation will be complicated when the service system becomes large. Improper...
Recent years witness the successful adoption of Cloud computing. However, security remains the top concern for cloud users. The fundamental issue is that cloud providers cannot convince cloud users the trustworthiness of cloud platforms. In this paper, we propose a cloud auditing framework, named CloudAuditor, to examine the behaviors of cloud platforms. By leveraging nested virtualization technology,...
A NoSQL, also called a "Non-Relational" or "Not only SQL," database system provides an approach to data management and database design for very large sets of distributed data and real-time web applications. A NoSQL database system is also a popular data storage for information retrieval because it supports better scalability, availability, and faster data access while comparing...
Time synchronization is very important in the IEEE802.15.4e network which aim to industrial automation applications. It enabled high end-to-end reliability and low power wireless networking. If an adversary launches time synchronization attacks to the IEEE802.15.4e networks, the whole network communications will be paralyzed. In this paper, we present two types of attacks: 1) ASN and 2) time synchronization...
Recent quick expansions of mobile heterogeneous embedded systems have led to a remarkable hardware upgrade that support multiple core processors. The energy consumption is becoming greater along with the computation capacity grows. Cloud computing is considered one of the solutions to mitigating energy costs. However, the simply offloading the computations to the remote side cannot efficiently reduce...
The correctness of implementation codes is important especially for safety-critical software usually written in C programming language. We present a correctness verification method (CVM for short) for C codes based on an automatic theorem proving tool-VCC, and propose a specification simplification method to im-prove the correctness and readability of verification specification codes. Using CVM method,...
Reinforcement learning is an area of machine learning inspired by behaviorist psychology, concerned with how software agents ought to take actions in an environment so as to maximize some notion of cumulative reward. Recently reinforcement learning has been given abroad attention, but when it is applied to solve problems with large-scale discrete or contiguous state space environments, the results...
Big data has revealed itself as a powerful tool for many sectors ranging from science to business. Distributed data-parallel computing is then common nowadays: using a large number of computing and storage resources makes possible data processing of a yet unknown scale. But to develop large-scale distributed big data processing, we have to tackle many challenges. One of the most complex is scheduling...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.