


default search action
24th CCGRID 2024: Philadelphia, PA, USA - Workshops
- 24th IEEE International Symposium on Cluster, Cloud and Internet Computing, CCGrid 2024 - Workshops, Philadelphia, PA, USA, May 6-9, 2024. IEEE 2024, ISBN 979-8-3503-7751-4
- Davide Margaria
, Alberto Carelli, Andrea Vesco
:
Building Trust in Data for IoT Systems. 1-8 - Yongwoo Oh, Michael Yiqing Hu, Xin Zhe Khooi, Jehyun Lee, Dinil Mon Divakaran, Min Suk Kang:
IoTell: A Privacy-Preserving Protocol for Large-scale Monitoring of IoT Security Status. 9-17 - Saman Tariq, Eva Rodríguez
, Xavi Masip-Bruin, Panos Trakadas, Admela Jukan, Diego R. López:
Strategy for Modeling Threats in 5G and B5G Networks. 18-25 - Renuka Cheeturi
, Syam Kumar Pasupuleti, Rashmi Ranjan Rout:
Lattice-Based Efficient Certificateless Public Auditing Scheme from RLWE for Cloud Storage. 26-33 - Ahmed Al Salih
, Yongge Wang:
Securing the Connected World: Fast and Byzantine Fault Tolerant Protocols for IoT, Edge, and Cloud Systems. 34-41 - Bernardo Pulido-Gaytan, Andrei Tchemykh, Mikhail G. Babenko, Jorge M. Cortés-Mendoza
, Horacio González-Vélez
, Arutyun Avetisyan:
Enhancing Cloud Security through Efficient Polynomial Approximations for Homomorphic Evaluation of Neural Network Activation Functions. 42-49 - Mariha Siddika Ahmad, Brajendra Panda:
Damage Assessment in Fog Computing Systems: A Blind Write Lineage Approach. 50-55 - Jess Kropczynski, Sunkanmi Oluwadare, Nate Elrod, Pranav Mahajan, Amir Asadi, Jake Koch, Lily Edinam Botsyoe:
Towards a Standardized Data Framework for Threat Detection in Smart Homes. 62-67 - Kunal Rao, Giuseppe Coviello, Srimat Chakradhar:
CLAP: Cost and Latency-Aware Placement of microservices on the computing continuum. 68-77 - Hena Ahmed, Ravi Shende, Ismael Pérez, Daniel Crawl
, Shweta Purawat, Ilkay Altintas:
Towards an Integrated Performance Framework for Fire Science and Management Workflows. 78-83 - Maria N. Anastasiadou, Philippos Isaia, Panayiotis Kolios, Demetrios G. Eliades, Christos Laoudias:
Leveraging ICTs for Effective COVID-19 Pandemics Management: Insights from a Health Information System Implementation in Cyprus. 84-91 - Daniel Balouek, Julien Pettré:
Collaborative services for Crowd Safety systems across the Edge-Cloud Computing Continuum. 92-97 - Pradeeban Kathiravelu, Ryan Birmingham:
Distributed Computing Systems and Approaches for Polar Science Research: An Interdisciplinary Systematic Review. 104-111 - Mateusz Krzyszton, Bartosz Bok, Pawel Zakieta, Joanna Kolodziej:
Evasion attacks on ML in domains with nonlinear constraints. 112-119 - George-Mircea Grosu, Silvia-Elena Nistor, Radu-Ioan Ciobanu, Ciprian Dobre, Florin Pop:
DroMPI: Parallel Computation Over Drop Computing. 120-127 - Bartlomiej Marek, Kacper Pieniazek, Filip Ratajczak, Wojciech Adamczyk, Bartosz Bok, Mateusz Krzyszton:
Securing ML-based Android Malware Detectors: A Defensive Feature Selection Approach against Backdoor Attacks. 128-135 - George-Mircea Grosu, Silvia-Elena Nistor, Radu-Ioan Ciobanu, Joanna Kolodziej, Florin Pop:
Computation Augmentation Techniques for Computing Continuum. 136-143 - Nirmal Kr. Biswas, Sourav Banerjee, Uttam Ghosh:
Design and Development of a Novel Bio-Inspired VM Placement in Green Cloud Computing Environment. 144-149 - Hongxiang He, Josh Self, Kelton French, Suman Bhunia, Mohammad Salman, Paulo Alexandre Regis:
Zerologon Explored: In-Depth Analysis and Mitigation Strategies for Microsoft's Critical Vulnerability. 150-157 - Chloe Stejskal, Alexander Perminov, Aaron Lester, Suman Bhunia, Mohammad Salman, Paulo Alexandre Regis:
Analyzing the Impact and Implications of COMB: A Comprehensive Study of 3 Billion Breached Credentials. 158-167 - Pushpita Chatterjee, Debashis Das, Danda B. Rawat:
A Generative AI Approach for Ensuring Data Integrity Security Resilience in Fintech Systems. 168-173 - Jacob Sorn, Patrick Carroll, Zachary Pang, Suman Bhunia, Mohammad Salman, Paulo Alexandre Regis:
Exploring the CAM4 Data Breach: Security Vulnerabilities and Response Strategies. 174-179 - Tathagata Bhattacharya, Vivek Tanniru, Subhashis Majumder, Saiteja Veeramalla:
Enhancing the Energy Efficiency with DURGA, a Novel Geographical Load Balancer. 180-190 - Shivatmica Murgai, Sharv Murgai:
Modeling User Behavior with Reduced Canonical Form (RCF): Exploring the Future with Human Machine Interface (HMI) for ITS. 191-196 - Eleni Aloupogianni
, Charalampos Karyotis, Tomasz Maniak, Rahat Iqbal, Nikos I. Passas, Zoran Vujicic, Faiyaz Doctor:
Network Slicing for Beyond 5G Networks using Machine Learning. 197-200 - Varun Dutt, Lucas Galan, Faiyaz Doctor, Lina Barakat, Kate Isaacs, Demetris Hadjigeorgiou, Aldo Fumagalli:
An AI Driven Pipeline for 6G Enabled Digital Creatives Identification, Performance Monitoring and Attribution. 201-207 - Brij B. Gupta, Akshat Gaurav, Varsha Arya, Kwok Tai Chui:
Efficient DDoS Attack Detection through Lightweight Deep Learning Model in Cloud Computing Environment. 208-212 - Brij B. Gupta, Kwok Tai Chui, Akshat Gaurav, Jinsong Wu:
Deep Neural Network Framework for the Identification of Smoking Events in 6G and Cloud-Enabled Smart Cities. 213-218 - Varvara Mineeva, Alexander Zhitov, Artem Volkov, Ammar Muthanna, Andrey Koucheryavy:
A Digital Avatar System for Telepresence Services in 6G Toward HolNetVerse. 219-224

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.