Search
Now showing items 1-10 of 17
Subjective evaluation of olfactory and visual media synchronization.
(ACM, 2013)
As a step towards enhancing users' perceived multimedia quality levels beyond the level offered by the classic audiovisual systems, the authors present the results of an experimental study which looked at user's perception ...
The influence of human factors on olfaction based mulsemedia quality of experience.
(IEEE, 2016)
With the aim to enrich users’ perceived
multimedia experience, the authors present the results of an
empirical study which looked at user perception of olfaction
based mulsemedia. The goal is to evaluate the influence ...
Access control policy enforcement for zero-trust-networking.
(IEEE, 2018-06)
The evolution of the enterprise computing landscape towards emerging trends such as fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of approach to securing computer networks to deal ...
Hop-by-hop congrestion measurement and practical active queue management in NDN
(IEEE, 2020-12)
Content replication and name-based routing in Named Data Network (NDN) naturally lead to connectionless multi-source and multipath transmissions. Traditional congestion control designed for end-to-end connections cannot ...
Situational awareness based risk-adaptable access control in enterprise networks.
(Association for Computing Machinery, 2017-03)
As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT),
enterprises are moving away from traditional perimeter based security models toward so called “zero trust
networking” ...
Property based attestation for a secure cloud monitoring system.
(IEEE, 2014-02)
—In this paper, we consider the problem of trust in
cloud monitoring systems. We design and develop a novel
scheme for trust certification using property based attestation
(PBA). The PBA is based on a trusted platform ...
Towards improved trust in threat intelligence sharing using Blockchain and trusted computing.
(IEEE Xplore, 2019-10)
Threat intelligence sharing is posited as an important aid to help counter cybersecurity attacks and a number of threat intelligence sharing communities exist. There is a general consensus that many challenges remain to ...
IProIoT: an in-network processing framework for IoT using information centric networking
(IEEE, 2017-07-27)
The Internet of Things (IoT) network supports various network applications through billions of heterogeneous connected devices. Efficient processing of enormous amounts of IoT data collected and exchanged by these devices ...
Containers and clusters for edge cloud architectures - a technology review.
(IEEE, 2015-10-26)
Cloud technology is moving towards more distribution across multi-clouds and the inclusion of various devices, as evident through IoT and network integration in the context of edge cloud and fog computing. Generally, ...
Host based intrusion detection system with combined CNN/RNN model.
(Springer, 2018-09)
Cyber security has become one of the most challenging aspects of modern world digital technology and it has become imperative to minimize and possibly avoid the impact of cybercrimes. Host based intrusion detection systems ...