Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
The growth of the Internet of Things (IoT) and computing applications creates a greater possibility of vulnerabilities, which malicious entities can use to cause damage. This makes special security techniques as intrusion detection... more
The growth of the Internet of Things (IoT) and computing applications creates a greater possibility of vulnerabilities, which malicious entities can use to cause damage. This makes special security techniques as intrusion detection mechanisms indispensable in modern computer systems. It is important to detect and identify the attack in a category so that specific countermeasures for the threat category are solved. However, most existing multiclass detection approaches have some weaknesses, mainly related to detecting specific categories of attacks and problems with false positives. This article addresses this research problem and advances state-of-the-art, bringing contributions to a two-stage detection architecture called DNNET-Ensemble, combining binary and multiclass detection. While the benign traffic can be quickly released on the first detection, the intrusive traffic can be subjected to a robust analysis approach without causing delay issues. Additionally, we propose the DNNET binary approach for the binary detection level, which can provide more accurate and faster binary detection. The proposed Hybrid Attribute Selection strategy can find an optimal subset of attributes through a wrapper method with a lower training cost due to pre-selection using a filter method. Furthermore, the proposed Soft-SMOTE improvement allows operating with a balanced dataset with a minor training time increase, even in scenarios where there are a large number of classes with a large imbalance among them. The results obtained in experiments with renowned intrusion datasets demonstrate that the approach can achieve superior detection rates and false positives performance compared to other state-of-the-art approaches.
O Protocolo de transferência de arquivos (FTP) é muito bem definido, implementado e utilizado pelo mundo. Apesar disto, algumas situações ocorrem onde seria desejável ter uma forma mais simples, rápida, mas ainda confiável de transmitir... more
O Protocolo de transferência de arquivos (FTP) é muito bem definido, implementado e utilizado pelo mundo. Apesar disto, algumas situações ocorrem onde seria desejável ter uma forma mais simples, rápida, mas ainda confiável de transmitir informações entre cliente e servidor. Neste trabalho apresentamos uma situação real de um projeto de cartão convênio onde esta necessidade se faz presente. Estudamos o FTP e o Telnet e descrevemos implementação do Fast-TP (Fast Transmission Protocol). A seguir efetuamos testes comparativos entre o Fast-TP e o FTP tradicional. Finalmente apresentamos aspectos de segurança da implementação do Fast-TP.
a series of events dedicated to mobility-at-large, dealing with challenges raised by mobile services and applications considering user, device and service mobility. Users increasingly rely on devices in different mobile scenarios and... more
a series of events dedicated to mobility-at-large, dealing with challenges raised by mobile services and applications considering user, device and service mobility. Users increasingly rely on devices in different mobile scenarios and situations. "Everything is mobile", and mobility is now ubiquitous. Services are supported in mobile environments, through smart devices and enabling software. While there are well known mobile services, the extension to mobile communities and on-demand mobility requires appropriate mobile radios, middleware and interfacing. Mobility management becomes more complex, but is essential for every business. Mobile wireless communications, including vehicular technologies bring new requirements for ad hoc networking, topology control and interface standardization. We take here the opportunity to warmly thank all the members of the MOBILITY 2015 Technical Program Committee, as well as the numerous reviewers. The creation of such a broad and high qual...
Cloud computing offers benefits in terms of availability and cost, but transfers the responsibility of information security management for the cloud service provider. Thus the consumer loses control over the security of their information... more
Cloud computing offers benefits in terms of availability and cost, but transfers the responsibility of information security management for the cloud service provider. Thus the consumer loses control over the security of their information and services. This factor has prevented the migration to cloud computing in many businesses. This paper proposes a model where the cloud consumer can perform risk analysis on providers before and after contracting the service. The proposed model establishes the responsibilities of three actors: Consumer, Provider and Security Labs. The inclusion of actor Security Labs provides more credibility to risk analysis making the results more consistent for the consumer.
Presentation · September 2017 DOI: 10.13140/RG.2.2.24990.64327/2 09/2017, Conference: VIII e-TIC (Encontro de Tecnologia do Instituto Federal Catarinense – Campus Camboriú), DOI: 10.13140/RG.2.2.24990.64327/2 Description Informações para... more
Presentation · September 2017 DOI: 10.13140/RG.2.2.24990.64327/2 09/2017, Conference: VIII e-TIC (Encontro de Tecnologia do Instituto Federal Catarinense – Campus Camboriú), DOI: 10.13140/RG.2.2.24990.64327/2 Description Informações para responder as seguintes perguntas: - Conceitue IoT (Internet das Coisas) e Segurança para IoT. - Comente sobre o ataque DDoS cuja a vítima foi a empresa Dyn, segundo divulgado no “theguardian” em 26/10/2016. - Cite e comente sobre alguns exemplos de aplicações de IoT. - Explique a interação entre IoT e Cloud (Fog e Edge). - Descreva os “OWASP IoT Top 10”.
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a... more
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a formal mathematical background and is generic, in contrast with other proposals. It receives new Virtual Machines on the Cloud and organizes them by relocating their placements based on the Multiple-Objectives of the environment. These Objectives are represented by Rules, Qualifiers and Costs, which can be easily added, extended and prioritized. In contrast to existing solutions, that address specific objectives, our framework was devised to be objective-agnostic and easily extensible, which enables the implementation of new and generic prioritized elements. Our work proposes an autonomic intrusion response technique that uses a utility function to determine the best response to the attack providing self-healing properties to the environment. Cloud computing allows the use of resources and systems in thousands of providers. This paradigm can use federated identity management to control user's identification data, but it is essential to preserve privacy, while performing authentication and access control. This tutorial describes a model where the cloud consumer can perform risk analysis on providers before and after contracting the service. We motivate the use of risk-based access control in the cloud and present a framework for enforcing risk-based policies.
This paper proposes a flexible framework to im- prove the quality of Virtual Machine’s placements, in Clouds. It organises them by relocating the VMs based on the Multiple- Objectives of the environment. These Objectives are represented... more
This paper proposes a flexible framework to im- prove the quality of Virtual Machine’s placements, in Clouds. It organises them by relocating the VMs based on the Multiple- Objectives of the environment. These Objectives are represented by Rules, Qualifiers, and Costs, which can be extended and prioritised. Based on Evolutionary Searches, the framework theoretically guarantees the adoption of a better set of Place- ments. More specifically, it seeks the non-dominated solutions (Pareto’s Dominance concept) and compares then considering the implementation cost of the scenario and its benefits. In contrast to existing solutions that address specific objectives, our framework was devised to support many types of objectives and to be easily extensible, which enables the implementation of new and generic prioritised elements. Moreover, we conducted experiments using data from a real Cloud environment and show the flexibility of our approach and its scalability.
The Fifth International Conference on Mobile Services, Resources, and Users (MOBILITY 2015), held between June 21-26, 2015, in Brussels, Belgium, continued a series of events dedicated to mobility- at-large, dealing with challenges raised... more
The Fifth International Conference on Mobile Services, Resources, and Users (MOBILITY 2015), held between June 21-26, 2015, in Brussels, Belgium, continued a series of events dedicated to mobility- at-large, dealing with challenges raised by mobile services and applications considering user, device and service mobility. Users increasingly rely on devices in different mobile scenarios and situations. "Everything is mobile", and mobility is now ubiquitous. Services are supported in mobile environments, through smart devices and enabling software. While there are well known mobile services, the extension to mobile communities and on-demand mobility requires appropriate mobile radios, middleware and interfacing. Mobility management becomes more complex, but is essential for every business. Mobile wireless communications, including vehicular technologies bring new requirements for ad hoc networking, topology control and interface standardization. We take here the opportunity to warmly thank all the members of the MOBILITY 2015 Technical Program Committee, as well as the numerous reviewers. The creation of such a broad and high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to MOBILITY 2015. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions. Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the MOBILITY 2015 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success. We hope that MOBILITY 2015 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the areas of mobile services, resources and users. We are convinced that the participants found the event useful and communications very open. We hope that Brussels, Belgium, provided a pleasant environment during the conference and everyone saved some time to enjoy the charm of the city.
Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriamento e controle remoto de objetos através de uma estrutura de rede. Facilita integração direta entre mundo físico e redes de comunicação.... more
Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriamento e controle remoto de objetos através de uma estrutura de rede. Facilita integração direta entre mundo físico e redes de comunicação. Comunicação: any TIME, any THING, any PLACE . Segurança de IoT não é apenas segurança de dispositivos! Todos os elementos precisam ser considerados (ecossistema): O dispositivo IoT, A nuvem (cloud) / o nevoeiro (fog), A aplicação móvel, As interfaces de rede, O software, Uso da criptografia, Uso da autenticação (RFID, X.509, end. MAC), Segurança física, Autorização...
—Due scale and dynamism of Cloud computing, there is a need for new tools and techniques for its management. This paper proposes an approach to model the load flow in cloud components using a double weighted Directed Acyclic Multigraphs.... more
—Due scale and dynamism of Cloud computing, there is a need for new tools and techniques for its management. This paper proposes an approach to model the load flow in cloud components using a double weighted Directed Acyclic Multigraphs. Such model enables the comparison, analysis and simulation of clouds, which assist the cloud management with the evaluation of modifications in the cloud structure and configuration. The existing solutions either do not have mathematical background, which hinders the comparison and production of structural variations in cloud models, or have the mathematical background, but are limited to a specific area (e.g. energy-efficiency), which does not provide the support the dynamic nature of clouds and to the different needs of the managers. Our model instead has a formal mathematical background and is generic. To this aim, we present its formalisation and algorithms that supports the load propagation and the states of services, systems, third-parties providers and resources, such as: computing, storage and networking. To demonstrate the applicability of our solution, we have implemented a software framework for modelling Infrastructure as a Service, and conducted numerical experiments with hypothetical loads.
Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - Risk Analysis for Cloud Computing 4 - Secure Internet of Things
This article provides a real-time intrusion response system in order to reduce the consequences of the attacks in the Cloud Computing. Our work proposes an autonomic intrusion response technique that uses a utility function to determine... more
This article provides a real-time intrusion response system in order to reduce the consequences of the attacks in the Cloud Computing. Our work proposes an autonomic intrusion response technique that uses a utility function to determine the best response to the attack providing self-healing properties to the environment. To achieve this goal, we propose the Intrusion Response Autonomic System (IRAS), which is an autonomic intrusion response system, using Big Data techniques for data analysis.
at addressing recent research results and forecasting challenges on selected topics related to communications, computation, networks and technologies. Considering the importance of innovative topics in today's technology-driven... more
at addressing recent research results and forecasting challenges on selected topics related to communications, computation, networks and technologies. Considering the importance of innovative topics in today's technology-driven society, there is a paradigm shift in classical-by-now approaches, such as networking, communications, resource sharing, collaboration and telecommunications. Recent achievements demand rethinking available technologies and considering the emerging ones. The conference had the following tracks:  Networking Mobility and Ubiquity Security, Trust, and Privacy We take here the opportunity to warmly thank all the members of the INNOV 2016 technical program committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to INNOV 2016. We truly believe that, thanks to all t...
Quality of service is one of the major concerns in cloud computing. Virtual machines (VMs) balancing techniques can help reduce service degradation in cloud computing environments. Several works have presented cloud computing balance... more
Quality of service is one of the major concerns in cloud computing. Virtual machines (VMs) balancing techniques can help reduce service degradation in cloud computing environments. Several works have presented cloud computing balance techniques, however, only a few used the similarity between VMs and physical hosts to map VMs migrations. In addition, most proposals do not consider the size, dynamism, and heterogeneity of the cloud when developing a management technique. We present a cloud computing VMs balancing algorithm that uses the similarity between VMs and physical hosts to create the map of migrations. Furthermore, the proposal takes into account the size, dynamism, and heterogeneity of the cloud when mapping VMs migrations, thus the proposal is developed in a distributed fashion, enabling the processing of each cluster at a time. To evaluate the proposal, we used the Google cluster data set. Experiments demonstrate that the proposed technique can improve the balance of alloc...
Dynamic federations allow users to access new service providers on demand. This dynamic access adds risks to personally identifiable information (PII) of users, since there are untrusted service providers. The federated identity... more
Dynamic federations allow users to access new service providers on demand. This dynamic access adds risks to personally identifiable information (PII) of users, since there are untrusted service providers. The federated identity management is essential to preserve privacy of users while performing authentication and access control in dynamic federations. This paper discusses characteristics to improve privacy in the dissemination of sensitive data of users in dynamic federations, proposing privacy scopes to be agreed in dynamic associations (federation time) among service providers and identity providers. A prototype of the dynamic federation and scopes agreement was developed using OpenID Connect. Keywords–Privacy; Dynamic Federation; OpenID Connect.
Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on the DDoS attack that the victim was the company Dyn, according to the "the guardian" reported on 26 Oct. 2016. - What the... more
Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on the DDoS attack that the victim was the company Dyn, according to the "the guardian" reported on 26 Oct. 2016. - What the really popular Internet of Things applications are right now? And in the future? - What is (will be) the interaction between IoT and Cloud (Fog and Edge)? And about security? - What is the OWASP (OpenWebApplicationSecurity Project) Internet of Things Project? - How many “things” are currently connected on the Internet? How many will we have in 2020? - How many BILLION DOLLARS will be the potential socioeconomic impact of the Internet of Things on the productivity of the Brazilian economy and the improvement of public services by 2025? China? USA? Europe? - How much will you earn until 2025, out of these 200 BILLION DOLLARS, if you start investing now in the Internet of Things? - What are the characteristics of networks that will support the Internet of Things, leading to the Low Power Wide Area (LPWA)?
This work provides the basis to understand and select Cloud Computing models applied for the development of IoT solutions using Low-Power Wide Area Network (LPWAN). Cloud Computing paradigm has transformed how the industry implement... more
This work provides the basis to understand and select Cloud Computing models applied for the development of IoT solutions using Low-Power Wide Area Network (LPWAN). Cloud Computing paradigm has transformed how the industry implement solution, through the commoditization of shared IT infrastructures. The advent of massive Internet of Things (IoT) and related workloads brings new challenges to this scenario demanding malleable configurations where the resources are distributed closer to data sources. We introduce an analysis of existing solution architectures, along with an illustrative case from where we derive the lessons, challenges, and opportunities of combining these technologies for a new generation of Cloudnative solutions.
We propose a flexible meta‐heuristic framework for virtual machine (VM) organisation, provisioning, and adaptation in the cloud domain, based on migration costs and environment constraints. Order@Cloud improves VM placements according to... more
We propose a flexible meta‐heuristic framework for virtual machine (VM) organisation, provisioning, and adaptation in the cloud domain, based on migration costs and environment constraints. Order@Cloud improves VM placements according to multiple objectives represented by rules, qualifiers, and improvement cost, which can be easily modified and extended. Order@Cloud theoretically guarantees the adoption of a better set of placements, after considering their costs and benefits, by prioritising the worst VM placements. While existing solutions address only specific objectives, our framework is objective‐agnostic and extensible, which enables the adoption and implementation of new policies and priorities. We conduct experiments using a real cloud environment data and discuss the framework's performance, flexibility, and optimality and provide insights on the challenges and benefits of deploying this framework.
Internet of Things (IoT) is the connection of any object to the internet, to generate useful information about its own state or surrounding environment. IoT allows new products and services to be applied in different areas, such as smart... more
Internet of Things (IoT) is the connection of any object to the internet, to generate useful information about its own state or surrounding environment. IoT allows new products and services to be applied in different areas, such as smart cities, industry, smart homes, environment monitoring, smart cars, heath monitoring and others. Fog computing emerges to meet the Quality of Service requirements, of low latency real time IoT systems, that Cloud Computing cannot guarantee. This paper presents a Fire Alarm fog System, for a Smart Home, with the development of an IoT device hardware. A fog system is also developed with a website, that displays the sensor values, and the estimated battery life of the IoT device. Calculations were done with a variation of sleep-time of the IoT device, the results shows an increase of 2.5 times of battery lifespan.
The authentication of restricted memory devices has major problems because memory consumption is high when applied with other protocols that have the purpose of mutual authentication. This article proposes an authentication model that... more
The authentication of restricted memory devices has major problems because memory consumption is high when applied with other protocols that have the purpose of mutual authentication. This article proposes an authentication model that validates mutually the parties in an Internet of Things environment applied in the context of Fog Computing. Through the hypothetic-deductive methodology, the deductions and hypotheses are presented for the formal proof of the new proposed method. The results achieved in the research show that the approach of the authentication mechanism is optimized, the prototype was validated in the AVISPA protocol evaluation tool and in a restricted memory controlled environment in a context of Fog Computing. However, this work is more appropriate in Fog Computing environments because there are no route changes as in Cloud Computing.
Abstract In the Internet of Things (IoT) systems, information of various kinds is continuously captured, processed, and transmitted by systems generally interconnected by the Internet and distributed solutions. Attacks to capture... more
Abstract In the Internet of Things (IoT) systems, information of various kinds is continuously captured, processed, and transmitted by systems generally interconnected by the Internet and distributed solutions. Attacks to capture information and overload services are common. This fact makes security techniques indispensable in IoT environments. Intrusion detection is one of the vital security points, aimed at identifying attempted attacks. The characteristics of IoT devices make it impossible to apply these solutions in this environment. Also, the existing anomaly-based methods for multiclass detection do not present acceptable accuracy. We present an intrusion detection architecture that operates in the fog computing layer. It has two steps and aims to classify events into specific types of attacks or non-attacks, for the execution of countermeasures. Our work presents a relevant contribution to the state of the art in this aspect. We propose a hybrid binary classification method called DNN-kNN. It has high accuracy and recall rates and is ideal for composing the first level of the two-stage detection method of the presented architecture. The approach is based on Deep Neural Networks (DNN) and the k-Nearest Neighbor (kNN) algorithm. It was evaluated with the public databases NSL-KDD and CICIDS2017. We used the method of selecting attributes based on the rate of information gain. The approach proposed in this work obtained 99.77% accuracy for the NSL-KDD dataset and 99.85% accuracy for the CICIDS2017 dataset. The experimental results showed that the proposed hybrid approach was able to achieve greater precision about classic machine learning approaches and the recent advances in intrusion detection for IoT systems. In addition, the approach works with low overhead in terms of memory and processing costs.
Due to constant workload growth, the infrastructure used to support cloud computing (CC) environments increases in size and complexity. As a consequence of that, human administrators are not able to monitor, analyze, plan and execute... more
Due to constant workload growth, the infrastructure used to support cloud computing (CC) environments increases in size and complexity. As a consequence of that, human administrators are not able to monitor, analyze, plan and execute actions upon the environment, seeking goals such as the environment optimization and service level agreements fulfillment. This proposal provides an autonomic framework to create virtual machines migrations and heuristics to select hosts to be activated or deactivated when needed. Moreover, the framework proposed in this paper works in a distributed way using multi-agent systems concepts. We provide an architecture to deal with the size, heterogeneity and dynamism of CC environments. Further, our proposal was added to the CloudStack platform as a plug-in for validation and experimentation.
Cloud computing allows the use of resources and systems in thousands of providers. This paradigm can use federated identity management to control user's identification data, but it is essential to preserve privacy, while performing... more
Cloud computing allows the use of resources and systems in thousands of providers. This paradigm can use federated identity management to control user's identification data, but it is essential to preserve privacy, while performing authentication and access control. This article discusses necessary characteristics to improve privacy in the dissemination of sensitive data of users in federated cloud computing paradigm. We plan to identify and use privacy techniques in identity management systems used in cloud. Users' attributes should have associated policies to minimize release of data exchanged in the process. It is also necessary to deal with privacy in interactions between authentication and authorization processes. This paper presents an approach to address the issues involving privacy around the personally identifiable information. The proposed model allows control of users' PII, provides some choices to assist users in data dissemination during the interaction and provides guarantees using user preferences on the SP side.
Nidaa A. Abbas, University of Babylon, Iraq Ryma Abassi, Higher School of Communication of Tunis / Sup'Com, Tunisia Javier M. Aguiar Pérez, Universidad de Valladolid, Spain Rui LA Aguiar, University of Aveiro, Portugal Ali H.... more
Nidaa A. Abbas, University of Babylon, Iraq Ryma Abassi, Higher School of Communication of Tunis / Sup'Com, Tunisia Javier M. Aguiar Pérez, Universidad de Valladolid, Spain Rui LA Aguiar, University of Aveiro, Portugal Ali H. Al-Bayatti, De Montfort University - Leicester, UK Ali Amer, Saudi Telecom Company - Riyadh, Saudi Arabia Pedro A. Aranda Gutiérrez, Telefónica I+D - Madrid, Spain Tulin Atmaca, TELECOM SudParis, France Michael Bauer, The University of Western Ontario - London, Canada Dominic Battré, TU-Berlin, Germany Micah Beck, ...
The new concept of proactive network management aims at identifying the existing troubles in advance to any performance degradation, as well as providing support for future decision-making actions. Within this context, a proposal for... more
The new concept of proactive network management aims at identifying the existing troubles in advance to any performance degradation, as well as providing support for future decision-making actions. Within this context, a proposal for performance evaluation applying the proactive concepts is here introduced. Moreover, theoretical and practical aspects emphasize the importance of the approach in question. In addition, simulation facilities
Due to the scale and dynamism of cloud computing, there is a need for new tools and techniques for its management. This paper proposes an approach to quantitative modelling of cloud components' behaviour, using double weighted... more
Due to the scale and dynamism of cloud computing, there is a need for new tools and techniques for its management. This paper proposes an approach to quantitative modelling of cloud components' behaviour, using double weighted Directed Acyclic Multigraphs (DAM) through the different abstraction levels of components. With this formalism, it is possible to analyse load propagation and its effects on the cloud elements from an Anything as a Service (xAAS) perspective. Such model enables the comparison, analysis and simulation of clouds, which assist the cloud management with the evaluation of modifications in the cloud structure and configuration. The existing solutions either do not have mathematical background, which hinders the comparison and production of structural variations in cloud models, or have the mathematical background, but are limited to a specific area (e.g., energy-efficiency), which does not provide support to the dynamic nature of clouds and to the different need...
In policy-based management, service providers want to enforce fine-grained policies for their resources and services. Besides the assurance of digital identity, service providers usually need personal data for evaluation of access control... more
In policy-based management, service providers want to enforce fine-grained policies for their resources and services. Besides the assurance of digital identity, service providers usually need personal data for evaluation of access control policies. The disclosure of personal data, also known as Personally Identifiable Information (PII), could represent a privacy breach. This paper proposes an architecture that allows an individual to obtain services without the need of releasing all personal attributes. The architecture achieves that outcome evaluating the targeted policy in the domain of the identity provider, that is, policies are sent from service providers to identity providers to be evaluated, without the need of releasing some PIIs to the service provider side. We also present an implementation of a prototype using XACML 3.0 for fine-grained authorization and OpenID Connect for identity management. The prototype was evaluated through an use case representing an hypothetical sc...
Research Interests:
This work presents the use of artificial intelligence (AI) techniques for aiding in the improvement of the performance of a high-speed networks management system. An intelligent agent is responsible for collect information and compare... more
This work presents the use of artificial intelligence (AI) techniques for aiding in the improvement of the performance of a high-speed networks management system. An intelligent agent is responsible for collect information and compare these information with a database that contains parameters for each information type in order to detect facts which identify proactively the possible existence of a problem. Such detection is conducted by means of AI techniques making possible proactive actions and, as such, may prevent the occurrence of problems.

And 302 more

Intrusion detection is one of the key points in computer security, and it aims to identify attempted attacks by unauthorized users. Several researches are being developed to solve security problems in environments involving the Internet... more
Intrusion detection is one of the key points in computer security, and it aims to identify attempted attacks by unauthorized users. Several researches are being developed to solve security problems in environments involving the Internet of Things, Fog Computing, and Cloud Computing. This mini-course has a theoretical and practical profile, aims to describe aspects of the context of intrusion detection in IoT and Fog Computing, presents Machine Learning techniques commonly used in intrusion detection, expose state-of-theart approaches, and present some results obtained in developed research.
The Second International Conference on Green Communications, Computing and Technologies (GREEN 2017), held between September 10-14, 2017 in Rome, continued the inaugural event focusing on current solutions, stringent requirements for... more
The Second International Conference on Green Communications, Computing and Technologies (GREEN 2017), held between September 10-14, 2017 in Rome, continued the inaugural event focusing on current solutions, stringent requirements for further development, and evaluations of potential directions. The event targeted to bring together academia, research institutes, and industries working towards green solutions.
Expected economic, environmental and society wellbeing impact of green computing and communications technologies led to important research and solutions achievements in recent years. Environmental sustainability, high-energy efficiency, diversity of energy sources, renewable energy resources contributed to new paradigms and technologies for green computing and communication.
Economic metrics and social acceptability are still under scrutiny, despite the fact that many solutions, technologies and products are available. Deployment at large scale and a long term evaluation of benefits are under way in different areas where dedicated solutions are applied.
The conference had the following tracks:
 Improving Green-ness
 Smart Energy and Smart Grid
We take here the opportunity to warmly thank all the members of the GREEN 2017 technical program committee, as well as all the reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to GREEN 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
We also gratefully thank the members of the GREEN 2017 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope that GREEN 2017 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the field of green communications, computing and technology. We also hope that Rome, Italy provided a pleasant environment during the conference and everyone found some time to enjoy the historic charm of the city.
Research Interests:
The Thirteenth International Conference on Wireless and Mobile Communications (ICWMC 2017), held between July 23 - 27, 2017 - Nice, France, followed on the previous events on advanced wireless technologies, wireless networking, and... more
The Thirteenth International Conference on Wireless and Mobile Communications (ICWMC 2017), held between July 23 - 27, 2017 - Nice, France, followed on the previous events on advanced wireless technologies, wireless networking, and wireless applications.
ICWMC 2017 addressed wireless related topics concerning integration of latest technological advances to realize mobile and ubiquitous service environments for advanced applications and services in wireless networks. Mobility and wireless, special services and lessons learnt from particular deployment complemented the traditional wireless topics.
We take here the opportunity to warmly thank all the members of the ICWMC 2017 Technical Program Committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to ICWMC 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the ICWMC 2017 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.
We hope that ICWMC 2017 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the area of wireless and mobile communications.
We are convinced that the participants found the event useful and communications very open. We also hope that Nice provided a pleasant environment during the conference and everyone saved some time for exploring this beautiful city.
Research Interests:
The Thirteenth International Conference on Wireless and Mobile Communications (ICWMC 2017), held between July 23 - 27, 2017 - Nice, France, followed on the previous events on advanced wireless technologies, wireless networking, and... more
The Thirteenth International Conference on Wireless and Mobile Communications (ICWMC 2017), held between July 23 - 27, 2017 - Nice, France, followed on the previous events on advanced wireless technologies, wireless networking, and wireless applications.
ICWMC 2017 addressed wireless related topics concerning integration of latest technological advances to realize mobile and ubiquitous service environments for advanced applications and services in wireless networks. Mobility and wireless, special services and lessons learnt from particular deployment complemented the traditional wireless topics.
We take here the opportunity to warmly thank all the members of the ICWMC 2017 Technical Program Committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to ICWMC 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the ICWMC 2017 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.
We hope that ICWMC 2017 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the area of wireless and mobile communications.
We are convinced that the participants found the event useful and communications very open. We also hope that Nice provided a pleasant environment during the conference and everyone saved some time for exploring this beautiful city.
Research Interests:
The Thirteenth International Conference on Autonomic and Autonomous Systems (ICAS 2017), held between May 21 - 25, 2017 - Barcelona, Spain, was a multi-track event covering related topics on theory and practice on systems automation,... more
The Thirteenth International Conference on Autonomic and Autonomous Systems (ICAS 2017), held between May 21 - 25, 2017 - Barcelona, Spain, was a multi-track event covering related topics on theory and practice on systems automation, autonomous systems and autonomic computing.
The main tracks referred to the general concepts of systems automation, and methodologies and techniques for designing, implementing and deploying autonomous systems. The next tracks developed around design and deployment of context-aware networks, services and applications, and the design and management of self-behavioral networks and services. We also considered monitoring, control, and management of autonomous self-aware and context-aware systems and topics dedicated to specific autonomous entities, namely, satellite systems, nomadic code systems, mobile networks, and robots. It has been recognized that modeling (in all forms this activity is known) is the fundamental for autonomous subsystems, as both managed and management entities must communicate and understand each other. Small-scale and large-scale virtualization and model-driven architecture, as well as management challenges in such architectures are considered. Autonomic features and autonomy requires a fundamental theory behind and solid control mechanisms. These topics gave credit to specific advanced practical and theoretical aspects that allow subsystem to expose complex behavior. We aimed to expose specific advancements on theory and tool in supporting advanced autonomous systems. Domain case studies (policy, mobility, survivability, privacy, etc.) and specific technology (wireless, wireline, optical, e-commerce, banking, etc.) case studies were targeted. A special track on mobile environments was indented to cover examples and aspects from mobile systems, networks, codes, and robotics.
Pervasive services and mobile computing are emerging as the next computing paradigm in which infrastructure and services are seamlessly available anywhere, anytime, and in any format. This move to a mobile and pervasive environment raises new opportunities and demands on the underlying systems. In particular, they need to be adaptive, self-adaptive, and context-aware.
Adaptive and self-management context-aware systems are difficult to create, they must be able to understand context information and dynamically change their behavior at runtime according to the context. Context information can include the user location, his preferences, his activities, the environmental conditions and the availability of computing and communication resources. Dynamic reconfiguration of the context-aware systems can generate inconsistencies as well as integrity problems, and combinatorial explosion of possible variants of these systems with a high degree of variability can introduce great complexity.
Traditionally, user interface design is a knowledge-intensive task complying with specific domains, yet being user friendly. Besides operational requirements, design recommendations refer to standards of the application domain or corporate guidelines.
Commonly, there is a set of general user interface guidelines; the challenge is due to a need for cross-team expertise. Required knowledge differs from one application domain to another, and the core knowledge is subject to constant changes and to individual perception and skills.
Passive approaches allow designers to initiate the search for information in a knowledge- database to make accessible the design information for designers during the design process. Active approaches, e.g., constraints and critics, have been also developed and tested. These mechanisms deliver information (critics) or restrict the design space (constraints) actively, according to the rules and
guidelines. Active and passive approaches are usually combined to capture a useful user interface
design.
We take here the opportunity to warmly thank all the members of the ICAS 2017 Technical
Program Committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to ICAS 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the ICAS 2017 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.
We hope that ICAS 2017 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the fields of autonomic and autonomous systems.
We are convinced that the participants found the event useful and communications very open. We also hope that Barcelona provided a pleasant environment during the conference and everyone saved some time for exploring this beautiful city.
Research Interests:
The Thirteenth International Conference on Autonomic and Autonomous Systems (ICAS 2017), held between May 21 - 25, 2017 - Barcelona, Spain, was a multi-track event covering related topics on theory and practice on systems automation,... more
The Thirteenth International Conference on Autonomic and Autonomous Systems (ICAS 2017), held between May 21 - 25, 2017 - Barcelona, Spain, was a multi-track event covering related topics on theory and practice on systems automation, autonomous systems and autonomic computing.
The main tracks referred to the general concepts of systems automation, and methodologies and techniques for designing, implementing and deploying autonomous systems. The next tracks developed around design and deployment of context-aware networks, services and applications, and the design and management of self-behavioral networks and services. We also considered monitoring, control, and management of autonomous self-aware and context-aware systems and topics dedicated to specific autonomous entities, namely, satellite systems, nomadic code systems, mobile networks, and robots. It has been recognized that modeling (in all forms this activity is known) is the fundamental for autonomous subsystems, as both managed and management entities must communicate and understand each other. Small-scale and large-scale virtualization and model-driven architecture, as well as management challenges in such architectures are considered. Autonomic features and autonomy requires a fundamental theory behind and solid control mechanisms. These topics gave credit to specific advanced practical and theoretical aspects that allow subsystem to expose complex behavior. We aimed to expose specific advancements on theory and tool in supporting advanced autonomous systems. Domain case studies (policy, mobility, survivability, privacy, etc.) and specific technology (wireless, wireline, optical, e-commerce, banking, etc.) case studies were targeted. A special track on mobile environments was indented to cover examples and aspects from mobile systems, networks, codes, and robotics.
Pervasive services and mobile computing are emerging as the next computing paradigm in which infrastructure and services are seamlessly available anywhere, anytime, and in any format. This move to a mobile and pervasive environment raises new opportunities and demands on the underlying systems. In particular, they need to be adaptive, self-adaptive, and context-aware.
Adaptive and self-management context-aware systems are difficult to create, they must be able to understand context information and dynamically change their behavior at runtime according to the context. Context information can include the user location, his preferences, his activities, the environmental conditions and the availability of computing and communication resources. Dynamic reconfiguration of the context-aware systems can generate inconsistencies as well as integrity problems, and combinatorial explosion of possible variants of these systems with a high degree of variability can introduce great complexity.
Traditionally, user interface design is a knowledge-intensive task complying with specific domains, yet being user friendly. Besides operational requirements, design recommendations refer to standards of the application domain or corporate guidelines.
Commonly, there is a set of general user interface guidelines; the challenge is due to a need for cross-team expertise. Required knowledge differs from one application domain to another, and the core knowledge is subject to constant changes and to individual perception and skills.
Passive approaches allow designers to initiate the search for information in a knowledge- database to make accessible the design information for designers during the design process. Active approaches, e.g., constraints and critics, have been also developed and tested. These mechanisms deliver information (critics) or restrict the design space (constraints) actively, according to the rules and
guidelines. Active and passive approaches are usually combined to capture a useful user interface
design.
We take here the opportunity to warmly thank all the members of the ICAS 2017 Technical
Program Committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to ICAS 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the ICAS 2017 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.
We hope that ICAS 2017 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the fields of autonomic and autonomous systems.
We are convinced that the participants found the event useful and communications very open. We also hope that Barcelona provided a pleasant environment during the conference and everyone saved some time for exploring this beautiful city.
Research Interests:
The Sixteenth International Conference on Networks (ICN 2017), held between April 23-27, 2017 in Venice, Italy, continued a series of events targeting general networking and services aspects in multi-technologies environments. The... more
The Sixteenth International Conference on Networks (ICN 2017), held between April 23-27, 2017 in Venice, Italy, continued a series of events targeting general networking and services aspects in multi-technologies environments. The conference covered fundamentals on networking and services, and highlighted new challenging industrial and research topics. Network control and management, multi-technology service deployment and assurance, next generation networks and ubiquitous services, emergency services and disaster recovery and emerging network communications and technologies were considered.
IPv6, the Next Generation of the Internet Protocol, has seen over the past three years tremendous activity related to its development, implementation and deployment. Its importance is unequivocally recognized by research organizations, businesses and governments worldwide. To maintain global competitiveness, governments are mandating, encouraging or actively supporting the adoption of IPv6 to prepare their respective economies for the future communication infrastructures. In the United States, government’s plans to migrate to IPv6 has stimulated significant interest in the technology and accelerated the adoption process. Business organizations are also increasingly mindful of the IPv4 address space depletion and see within IPv6 a way to solve pressing technical problems. At the same time IPv6 technology continues to evolve beyond IPv4 capabilities. Communications equipment manufacturers and applications developers are actively integrating IPv6 in their products based on market demands.
IPv6 creates opportunities for new and more scalable IP based services while representing a fertile and growing area of research and technology innovation. The efforts of successful research projects, progressive service providers deploying IPv6 services and enterprises led to a significant body of knowledge and expertise. It is the goal of this workshop to facilitate the dissemination and exchange of technology and deployment related information, to provide a forum where academia and industry can share ideas and experiences in this field that could accelerate the adoption of IPv6. The workshop brings together IPv6 research and deployment experts that will share their work. The audience will hear the latest technological updates and will be provided with examples of successful IPv6 deployments; it will be offered an opportunity to learn what to expect from IPv6 and how to prepare for it.
Packet Dynamics refers broadly to measurements, theory and/or models that describe the time evolution and the associated attributes of packets, flows or streams of packets in a network. Factors impacting packet dynamics include cross traffic, architectures of intermediate nodes (e.g., routers, gateways, and firewalls), complex interaction of hardware resources and protocols at various levels, as well as implementations that often involve competing and conflicting requirements.
Parameters such as packet reordering, delay, jitter and loss that characterize the delivery of packet streams are at times highly correlated. Load-balancing at an intermediate node may, for example, result in out-of-order arrivals and excessive jitter, and network congestion may
manifest as packet losses or large jitter. Out-of-order arrivals, losses, and jitter in turn may lead to unnecessary retransmissions in TCP or loss of voice quality in VoIP.
With the growth of the Internet in size, speed and traffic volume, understanding the impact of underlying network resources and protocols on packet delivery and application performance has assumed a critical importance. Measurements and models explaining the variation and interdependence of delivery characteristics are crucial not only for efficient operation of networks and network diagnosis, but also for developing solutions for future networks.
Local and global scheduling and heavy resource sharing are main features carried by Grid networks. Grids offer a uniform interface to a distributed collection of heterogeneous computational, storage and network resources. Most current operational Grids are dedicated to a limited set of computationally and/or data intensive scientific problems.
Optical burst switching enables these features while offering the necessary network flexibility demanded by future Grid applications. Currently ongoing research and achievements refers to high performance and computability in Grid networks. However, the communication and computation mechanisms for Grid applications require further development, deployment and validation.
The conference had the following tracks:
 Networking
 Computation and Networking
 Communication
 Next generation networks (NGN) and network management
 Advances in Adaptive Filtering for Acoustic Applications
 DMM: Distributed Mobility Management - Towards Efficient and Scalable Mobile
Networks
The conference also featured the following symposiun:
• SOFTNETWORKING 2017, The International Symposium on Advances in Software
Defined Networking and Network Functions Virtualization
We take here the opportunity to warmly thank all the members of the ICN 2017 technical program committee, as well as all the reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to ICN 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
We also gratefully thank the members of the ICN 2017 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope that ICN 2017 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the area of networks. We also hope that Venice, Italy provided a pleasant environment during the conference and everyone saved some time to enjoy the unique charm of the city.
Research Interests:
The Sixteenth International Conference on Networks (ICN 2017), held between April 23-27, 2017 in Venice, Italy, continued a series of events targeting general networking and services aspects in multi-technologies environments. The... more
The Sixteenth International Conference on Networks (ICN 2017), held between April 23-27, 2017 in Venice, Italy, continued a series of events targeting general networking and services aspects in multi-technologies environments. The conference covered fundamentals on networking and services, and highlighted new challenging industrial and research topics. Network control and management, multi-technology service deployment and assurance, next generation networks and ubiquitous services, emergency services and disaster recovery and emerging network communications and technologies were considered.
IPv6, the Next Generation of the Internet Protocol, has seen over the past three years tremendous activity related to its development, implementation and deployment. Its importance is unequivocally recognized by research organizations, businesses and governments worldwide. To maintain global competitiveness, governments are mandating, encouraging or actively supporting the adoption of IPv6 to prepare their respective economies for the future communication infrastructures. In the United States, government’s plans to migrate to IPv6 has stimulated significant interest in the technology and accelerated the adoption process. Business organizations are also increasingly mindful of the IPv4 address space depletion and see within IPv6 a way to solve pressing technical problems. At the same time IPv6 technology continues to evolve beyond IPv4 capabilities. Communications equipment manufacturers and applications developers are actively integrating IPv6 in their products based on market demands.
IPv6 creates opportunities for new and more scalable IP based services while representing a fertile and growing area of research and technology innovation. The efforts of successful research projects, progressive service providers deploying IPv6 services and enterprises led to a significant body of knowledge and expertise. It is the goal of this workshop to facilitate the dissemination and exchange of technology and deployment related information, to provide a forum where academia and industry can share ideas and experiences in this field that could accelerate the adoption of IPv6. The workshop brings together IPv6 research and deployment experts that will share their work. The audience will hear the latest technological updates and will be provided with examples of successful IPv6 deployments; it will be offered an opportunity to learn what to expect from IPv6 and how to prepare for it.
Packet Dynamics refers broadly to measurements, theory and/or models that describe the time evolution and the associated attributes of packets, flows or streams of packets in a network. Factors impacting packet dynamics include cross traffic, architectures of intermediate nodes (e.g., routers, gateways, and firewalls), complex interaction of hardware resources and protocols at various levels, as well as implementations that often involve competing and conflicting requirements.
Parameters such as packet reordering, delay, jitter and loss that characterize the delivery of packet streams are at times highly correlated. Load-balancing at an intermediate node may, for example, result in out-of-order arrivals and excessive jitter, and network congestion may
manifest as packet losses or large jitter. Out-of-order arrivals, losses, and jitter in turn may lead to unnecessary retransmissions in TCP or loss of voice quality in VoIP.
With the growth of the Internet in size, speed and traffic volume, understanding the impact of underlying network resources and protocols on packet delivery and application performance has assumed a critical importance. Measurements and models explaining the variation and interdependence of delivery characteristics are crucial not only for efficient operation of networks and network diagnosis, but also for developing solutions for future networks.
Local and global scheduling and heavy resource sharing are main features carried by Grid networks. Grids offer a uniform interface to a distributed collection of heterogeneous computational, storage and network resources. Most current operational Grids are dedicated to a limited set of computationally and/or data intensive scientific problems.
Optical burst switching enables these features while offering the necessary network flexibility demanded by future Grid applications. Currently ongoing research and achievements refers to high performance and computability in Grid networks. However, the communication and computation mechanisms for Grid applications require further development, deployment and validation.
The conference had the following tracks:
 Networking
 Computation and Networking
 Communication
 Next generation networks (NGN) and network management
 Advances in Adaptive Filtering for Acoustic Applications
 DMM: Distributed Mobility Management - Towards Efficient and Scalable Mobile
Networks
The conference also featured the following symposiun:
• SOFTNETWORKING 2017, The International Symposium on Advances in Software
Defined Networking and Network Functions Virtualization
We take here the opportunity to warmly thank all the members of the ICN 2017 technical program committee, as well as all the reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to ICN 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
We also gratefully thank the members of the ICN 2017 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope that ICN 2017 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the area of networks. We also hope that Venice, Italy provided a pleasant environment during the conference and everyone saved some time to enjoy the unique charm of the city.
Research Interests:
The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2017), held between February 19-23, 2017 in Athens, Greece, continued a series of events meant to prospect the applications supported by... more
The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2017), held between February 19-23, 2017 in Athens, Greece, continued a series of events meant to prospect the applications supported by the cloud computing paradigm and validate the techniques and the mechanisms. A complementary target was to identify the open issues and the challenges to fix them, especially on security, privacy, and inter- and intra-clouds protocols.
Cloud computing is a normal evolution of distributed computing combined with Service- oriented architecture, leveraging most of the GRID features and Virtualization merits. The technology foundations for cloud computing led to a new approach of reusing what was achieved in GRID computing with support from virtualization.
The conference had the following tracks:
 Virtualization
 Big Spatial Data Management
 Cloud Cyber Security
 Cloud Computing
 Platforms, infrastructures and applications
 Security and Privacy in Cloud Computing
 Challenges
We take here the opportunity to warmly thank all the members of the CLOUD COMPUTING 2017 technical program committee, as well as all the reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to CLOUD COMPUTING 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations and sponsors. We also gratefully thank the members of the CLOUD COMPUTING 2017 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope that CLOUD COMPUTING 2017 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the field of cloud computing, GRIDs and virtualization. We also hope that Athens, Greece provided a pleasant environment during the conference and everyone saved some time to enjoy the charm of the city.
Research Interests:
The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2017), held between February 19-23, 2017 in Athens, Greece, continued a series of events meant to prospect the applications supported by... more
The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2017), held between February 19-23, 2017 in Athens, Greece, continued a series of events meant to prospect the applications supported by the cloud computing paradigm and validate the techniques and the mechanisms. A complementary target was to identify the open issues and the challenges to fix them, especially on security, privacy, and inter- and intra-clouds protocols.
Cloud computing is a normal evolution of distributed computing combined with Service- oriented architecture, leveraging most of the GRID features and Virtualization merits. The technology foundations for cloud computing led to a new approach of reusing what was achieved in GRID computing with support from virtualization.
The conference had the following tracks:
 Virtualization
 Big Spatial Data Management
 Cloud Cyber Security
 Cloud Computing
 Platforms, infrastructures and applications
 Security and Privacy in Cloud Computing
 Challenges
We take here the opportunity to warmly thank all the members of the CLOUD COMPUTING 2017 technical program committee, as well as all the reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to CLOUD COMPUTING 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations and sponsors. We also gratefully thank the members of the CLOUD COMPUTING 2017 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope that CLOUD COMPUTING 2017 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the field of cloud computing, GRIDs and virtualization. We also hope that Athens, Greece provided a pleasant environment during the conference and everyone saved some time to enjoy the charm of the city.
Research Interests:
The Twelfth International Conference on Wireless and Mobile Communications (ICWMC 2016), held between November 13-17, 2016 - Barcelona, Spain, followed on the previous events on advanced wireless technologies, wireless networking, and... more
The Twelfth International Conference on Wireless and Mobile Communications (ICWMC 2016), held between November 13-17, 2016 - Barcelona, Spain, followed on the previous events on advanced wireless technologies, wireless networking, and wireless applications.
ICWMC 2016 addressed wireless related topics concerning integration of latest technological advances to realize mobile and ubiquitous service environments for advanced applications and services in wireless networks. Mobility and wireless, special services and lessons learnt from particular deployment complemented the traditional wireless topics.
We take here the opportunity to warmly thank all the members of the ICWMC 2016 Technical Program Committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to ICWMC 2016. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the ICWMC 2016 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.
We hope that ICWMC 2016 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the area of wireless and mobile communications.
We are convinced that the participants found the event useful and communications very open. We also hope the attendees enjoyed the charm of Barcelona, Spain.
Research Interests:
The Eleventh International Conference on Systems and Networks Communications (ICSNC 2016), held on August 21 - 25, 2016 in Rome, Italy, continued a series of events covering a broad spectrum of systems and networks related topics. We... more
The Eleventh International Conference on Systems and Networks Communications (ICSNC 2016), held on August 21 - 25, 2016 in Rome, Italy, continued a series of events covering a broad spectrum of systems and networks related topics.
We welcomed technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard forums or in industry consortiums, survey papers addressing the key problems and solutions on any of the above topics, short papers on work in progress, and panel proposals.
We take here the opportunity to warmly thank all the members of the ICSNC 2016 technical program committee as well as the numerous reviewers. The creation of such a broad and high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and efforts to contribute to the ICSNC 2016. We truly believe that thanks to all these efforts, the final conference program consists of top quality contributions.
This event could also not have been a reality without the support of many individuals, organizations and sponsors. We also gratefully thank the members of the ICSNC 2016 organizing committee for their help in handling the logistics and for their work that is making this professional meeting a success. We gratefully appreciate to the technical program committee co-chairs that contributed to identify the appropriate groups to submit contributions.
We hope the ICSNC 2016 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in networking and systems communications research. We also hope Rome provided a pleasant environment during the conference and everyone saved some time for exploring this beautiful historic city.
Research Interests:
High performance computing and communications is a key enabling technology to improve cutting-edge research performance and capabilities, especially when addressing large and complex problems with tight timing schedules. Building high... more
High performance computing and communications is a key enabling technology to improve cutting-edge research performance and capabilities, especially when addressing large and complex problems with tight timing schedules. Building high performance and efficient computing and communications systems can be addressed at multiple platform layers such as computer architecture, software, hardware, language and compiler design, embedded systems, and networking. The special issue on ‘High performance computing and communications’ will target a wide spectrum of the state-of-the-art as well as emerging topics pertaining to high performance computing, computer communications, new computing paradigms, and so on. After a careful review, six eminent papers are selected from a good number of quality submissions received. A detailed overview of the selected works is given below.
The first paper, ‘An energy-efficient data transfer strategy with link rate control for cloud’, proposes a novel energy-efficient data transfer strategy called LRCDT. By scheduling bandwidth in a link rate controlled fashion, LRCDT intends to reduce the
Copyright © 2015 Inderscience Enterprises Ltd.
 
334 G. Duan and C.B. Westphall
energy consumption specifically for data transfer that does not require the maximum transfer speed.
In the second paper, ‘Adaptive call admission control scheme with optimal resource allocation for multi-class cellular networks’, a new adaptive call admission control scheme is proposed for allocating bandwidth optimally as well as provisioning QoS to the mobile users so far as practicable.
The third paper, ‘A SLA-based cloud resource provisioning optimisation mechanism for multi-tenant applications’, proposes a service level agreements (SLA)-based resource provisioning optimisation mechanism for multi-tenant applications. The mechanism divides the tenants’ SLA into SLA constraints, and maps each SLA constraint to the corresponding service.
In the fourth paper, ‘Optimal VM placement in data centres with architectural and resource constraints’, authors take into consideration of data-centre architecture, inter-virtual machine (VM) traffic pattern, and resource capacity of physical machines (PMs) to propose a low-complexity heuristic algorithm to solve the VM placement problem.
In the fifth paper, ‘Optimising MPI tree-based communication for NUMA architectures’, the authors treat a multi-core node as a heterogeneous unit and optimise the performance of MPI scatter/gather communications by scheduling messages according to topology information. The proposed solution is to modify the fastest edge first heuristic by taking into account how many messages can be sent in parallel between cores on different processors without impeding the bandwidth.
The last paper, ‘Dynamic MPI parallel task scheduling based on a master-worker pattern in cloud computing’, proposes a dynamic parallel task scheduling method by employing a master-worker model on a real-world engineering application executed on the Azure cloud. The main idea is to schedule tasks on cloud compute resources depending on the actual workload of each process instead of static-scheduled load.
We would like to express our great appreciation to all reviewers for their time and contributions, and offering good advice or recommendations, we also thank the authors for their devoted efforts, experience, and insights into these important topics. We wish that this issue will be available resource for your work.
Research Interests:
The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2016), held between March 20-24, 2016 in Rome, Italy, continued a series of events targeted to prospect the applications supported by the... more
The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2016), held between March 20-24, 2016 in Rome, Italy, continued a series of events targeted to prospect the applications supported by the new paradigm and validate the techniques and the mechanisms. A complementary target was to identify the open issues and the challenges to fix them, especially on security, privacy, and inter- and intra-clouds protocols.
Cloud computing is a normal evolution of distributed computing combined with Service- oriented architecture, leveraging most of the GRID features and Virtualization merits. The technology foundations for cloud computing led to a new approach of reusing what was achieved in GRID computing with support from virtualization.
The conference had the following tracks:
 Cloud computing
 Computing in virtualization-based environments
 Platforms, infrastructures and applications
 Challenging features
Similar to the previous edition, this event attracted excellent contributions and active participation from all over the world. We were very pleased to receive top quality contributions.
We take here the opportunity to warmly thank all the members of the CLOUD COMPUTING 2016 technical program committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to CLOUD COMPUTING 2016. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations and sponsors. We also gratefully thank the members of the CLOUD COMPUTING 2016 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope that CLOUD COMPUTING 2016 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the area of cloud computing, GRIDs and virtualization. We also hope that Rome provided a pleasant
environment during the conference and everyone saved some time for exploring this beautiful city.
Research Interests:
The Fifteenth International Conference on Networks (ICN 2016), held between February 21- 25, 2016 in Lisbon, Portugal continued a series of events focusing on the advances in the field of networks. ICN 2016 welcomed technical papers... more
The Fifteenth International Conference on Networks (ICN 2016), held between February 21- 25, 2016 in Lisbon, Portugal continued a series of events focusing on the advances in the field of networks.
ICN 2016 welcomed technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions, short papers on work in progress, and panel proposals.
The conference had the following tracks:
 Performance evaluation, tools, simulation
 Communications security, reliability, availability
 Software Defined Networks and Network Functions Virtualization
 Internet of Things, cellular cognitive networks
The conference also featured the following symposium:
• SOFTNETWORKING 2016, The International Symposium on Advances in Software Defined Networking and Network Functions Virtualization
We take here the opportunity to warmly thank all the members of the ICN 2016 technical program committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to ICN 2016. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations and sponsors. We also gratefully thank the members of the ICN 2016 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope ICN 2016 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the field of networks. We also hope that Lisbon, Portugal, provided a pleasant environment during the conference and everyone saved some time to enjoy the beauty of the city.
Research Interests:
Presentation · September 2017 DOI: 10.13140/RG.2.2.24990.64327/2 09/2017, Conference: VIII e-TIC (Encontro de Tecnologia do Instituto Federal Catarinense – Campus Camboriú), DOI: 10.13140/RG.2.2.24990.64327/2 Description Informações para... more
Presentation · September 2017
DOI: 10.13140/RG.2.2.24990.64327/2
09/2017, Conference: VIII e-TIC (Encontro de Tecnologia do Instituto Federal Catarinense – Campus Camboriú), DOI: 10.13140/RG.2.2.24990.64327/2
Description
Informações para responder as seguintes perguntas: - Conceitue IoT (Internet das Coisas) e Segurança para IoT. - Comente sobre o ataque DDoS cuja a vítima foi a empresa Dyn, segundo divulgado no “theguardian” em 26/10/2016. - Cite e comente sobre alguns exemplos de aplicações de IoT. - Explique a interação entre IoT e Cloud (Fog e Edge). - Descreva os “OWASP IoT Top 10”.
Research Interests:
Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriamento e controle remoto de objetos através de uma estrutura de rede. Facilita integração direta entre mundo físico e redes de comunicação.... more
Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriamento e controle remoto de objetos através de uma estrutura de rede. Facilita integração direta entre mundo físico e redes de comunicação. Comunicação: any TIME, any THING, any PLACE . Segurança de IoT não é apenas segurança de dispositivos! Todos os elementos precisam ser considerados (ecossistema): O dispositivo IoT, A nuvem (cloud) / o nevoeiro (fog), A aplicação móvel, As interfaces de rede, O software, Uso da criptografia, Uso da autenticação (RFID, X.509, end. MAC), Segurança física, Autorização...
Research Interests:
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a... more
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a formal mathematical background and is generic, in contrast with other proposals. It receives new Virtual Machines on the Cloud and organizes them by relocating their placements based on the Multiple-Objectives of the environment. These Objectives are represented by Rules, Qualifiers and Costs, which can be easily added, extended and prioritized. In contrast to existing solutions, that address specific objectives, our framework was devised to be objective-agnostic and easily extensible, which enables the implementation of new and generic prioritized elements. Our work proposes an autonomic intrusion response technique that uses a utility function to determine the best response to the attack providing self-healing properties to the environment. Cloud computing allows the use of resources and systems in thousands of providers. This paradigm can use federated identity management to control user's identification data, but it is essential to preserve privacy, while performing authentication and access control. This tutorial describes a model where the cloud consumer can perform risk analysis on providers before and after contracting the service. We motivate the use of risk-based access control in the cloud and present a framework for enforcing risk-based policies.
Research Interests:
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a... more
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a formal mathematical background and is generic, in contrast with other proposals. It receives new Virtual Machines on the Cloud and organizes them by relocating their placements based on the Multiple-Objectives of the environment. These Objectives are represented by Rules, Qualifiers and Costs, which can be easily added, extended and prioritized. In contrast to existing solutions, that address specific objectives, our framework was devised to be objective-agnostic and easily extensible, which enables the implementation of new and generic prioritized elements. Our work proposes an autonomic intrusion response technique that uses a utility function to determine the best response to the attack providing self-healing properties to the environment. Cloud computing allows the use of resources and systems in thousands of providers. This paradigm can use federated identity management to control user's identification data, but it is essential to preserve privacy, while performing authentication and access control. This tutorial describes a model where the cloud consumer can perform risk analysis on providers before and after contracting the service. We motivate the use of risk-based access control in the cloud and present a framework for enforcing risk-based policies.
Research Interests:
Research Interests:
Summary:
1 - Cloud Computing Security Monitoring
2 - Federated Identity for Cloud Computing
3 - Risk Analysis for Cloud Computing
4 - Secure Internet of Things
Research Interests:
Summary:
1 - Cloud Computing Security Monitoring
2 - Federated Identity for Cloud Computing
3 - Risk Analysis for Cloud Computing
4 - Secure Internet of Things
Research Interests:
Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on the DDoS attack that the victim was the company Dyn, according to the "the guardian" reported on 26 Oct. 2016. - What the really popular... more
Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on the DDoS attack that the victim was the company Dyn, according to the "the guardian" reported on 26 Oct. 2016. - What the really popular Internet of Things applications are right now? And in the future? - What is (will be) the interaction between IoT and Cloud (Fog and Edge)? And about security? - What is the OWASP (OpenWebApplicationSecurity Project) Internet of Things Project? - How many “things” are currently connected on the Internet? How many will we have in 2020? - How many BILLION DOLLARS will be the potential socioeconomic impact of the Internet of Things on the productivity of the Brazilian economy and the improvement of public services by 2025? China? USA? Europe? - How much will you earn until 2025, out of these 200 BILLION DOLLARS, if you start investing now in the Internet of Things? - What are the characteristics of networks that will support the Internet of Things, leading to the Low Power Wide Area (LPWA)?
Research Interests: