Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025
Towards multi-stakeholder value/quality conflict detection, measurement and resolution in composite services: Conflict detection, measurement...
AbstractThe composite service is a popular service paradigm, in which service providers from various fields establish cooperative relationships for capability complementarity and value co-creation. However, due to the complex dependences on service value-...
- research-articleJanuary 2025
SPP: stochastic process-based placement for VM consolidation in cloud environments
AbstractThe rapid growth and increasing popularity of cloud services have made effective resource management and energy consumption in data centers crucial. Virtual Machine (VM) consolidation is a widely adopted strategy to reduce energy consumption and ...
- research-articleDecember 2024
Indoor energy-saving strategy optimization based on deep reinforcement learning and DDPG algorithm
AbstractIn order to understand the indoor energy-saving strategy optimization method of DDPG algorithm in air conditioning and heating system. Systems, this study proposes an indoor energy-saving strategy optimization method based on deep reinforcement ...
- research-articleDecember 2024
A novel collaborative privacy protection scheme based on verifiable secret sharing and trust mechanism
AbstractIn recent years, ensuring the privacy of location-based services (LBSs) has become a central concern. While various privacy protection strategies have been proposed, user collaboration remains a standard and widely-used solution to address service ...
- research-articleNovember 2024
Simulafed: an enhanced federated simulated environment for privacy and security in health
- Jose M. Rivas,
- Carlos Fernandez-Basso,
- Roberto Morcillo-Jimenez,
- Juan Paños-Basterra,
- M. Dolores Ruiz,
- Maria J. Martin-Bautista
AbstractFederated learning enables collaborative data analysis without the need to share sensitive information among participants, addressing privacy concerns in domains such as healthcare and finance. However, current federated simulation environments ...
-
- review-articleNovember 2024
Distributed computing in multi-agent systems: a survey of decentralized machine learning approaches
AbstractAt present, there is a pressing need for data scientists and academic researchers to devise advanced machine learning and artificial intelligence-driven systems that can effectively tackle forthcoming security challenges. This is due to the rapid ...
- research-articleAugust 2024
Large language models: a new approach for privacy policy analysis at scale
AbstractThe number and dynamic nature of web sites and mobile applications present regulators and app store operators with significant challenges when it comes to enforcing compliance with applicable privacy and data protection laws. Over the past several ...
- research-articleAugust 2024
PP-PRNU: PRNU-based source camera attribution with privacy-preserving applications
AbstractTracing the origin of digital images is a crucial concern in digital image forensics, where accurately identifying the source of an image is essential that leads important clues to investing and law enforcement agencies. Photo Response Non-...
- research-articleJuly 2024
Efficient hashing technique for malicious profile detection at hypervisor environment
AbstractAttack detection in cyber security systems is one of the complex tasks which require domain specific knowledge and cognitive intelligence to detect novel and unknown attacks from large scale network data. This research explores how the network ...
- review-articleJuly 2024
Federated learning for digital healthcare: concepts, applications, frameworks, and challenges
AbstractVarious hospitals have adopted digital technologies in the healthcare sector for various healthcare-related applications. Due to the effect of the Covid-19 pandemic, digital transformation has taken place in many domains, especially in the ...
- research-articleNovember 2023
- research-articleNovember 2023
Can we quantify trust? Towards a trust-based resilient SIoT network
AbstractThe emerging yet promising paradigm of the Social Internet of Things (SIoT) integrates the notion of the Internet of Things with human social networks. In SIoT, objects, i.e., things, have the capability to socialize with the other objects in the ...
- research-articleOctober 2023
A systematic study on blockchain technology in education: initiatives, products, applications, benefits, challenges and research direction
AbstractBlockchain facilitates the education sector from its unique bundles of characteristics, like decentralization, immutability, reliability, transparency, traceability, security, and integrity. These characteristics improve the ecosystem’s ...
- research-articleAugust 2023
ROI: a method for identifying organizations receiving personal data
AbstractMany studies have exposed the massive collection of personal data in the digital ecosystem through, for instance, websites, mobile apps, or smart devices. This fact goes unnoticed by most users, who are also unaware that the collectors are sharing ...
- research-articleDecember 2022
Intelligent and compliant dynamic software license consolidation in cloud environment
AbstractBased on the virtualization technology and pushed by the softwarization paradigm and the actual demand for services and resources, commercial cloud data centers know an unprecedented expansion. The systematic presence of software and the services ...
- research-articleOctober 2022
IoT-Gov: an IoT governance framework using the blockchain
AbstractInternet of Things (IoT) has become an essential technology in different daily life domains including health, industry and finance among many others. The implementation of IoT systems requires different underlying technologies such as applications,...
- research-articleSeptember 2022
An insight into cloud forensic readiness by leading cloud service providers: a survey
AbstractIn today’s digital world, it is hard to imagine the Information Technology field without cloud computing as it saves millions of dollars every year and enables it to focus on its core business rather than on managing complex computing ...
- research-articleSeptember 2022
A systematic mapping study on automated analysis of privacy policies
AbstractA privacy policy describes the operations an organization carries out on its users’ personal data and how it applies data protection principles. The automated analysis of privacy policies is a multidisciplinary research topic producing a growing ...
- research-articleAugust 2022
All-dummy k-anonymous privacy protection algorithm based on location offset
AbstractWhile k-anonymous algorithms can effectively protect users’ private location information, the problem of selecting an appropriate location in the anonymous area to construct the k-anonymous area remains a significant one. When selecting real users ...