Now showing items 1-10 of 23
Project-based learning in programming classes the effect of open project scope on student motivation and learning outcome
In this paper we report on the use of project-based learning in teaching a second-year course in Electrical Engineering that comprises learning to program in LabVIEW a graphical programming language and a basic ...
The Concept of Workload Delay as a Quality-of-Service Metric for Consolidated Cloud Environments with Deadline Requirements
Virtual Machine (VM) consolidation in the cloud has received significant research interest. A large body of approaches for VM consolidation in data centers resort to variants of the bin packing problem which tries to ...
A Queue Model for Reliable Forecasting of Future CPU Consumption
Statistical queuing models are popular to analyze a computer systems ability to process different types requests. A common strategy is to run stress tests by sending artificial requests to the system. The rate and sizes ...
Crowdsourcing-based Disaster Management using Fog Computing in Internet of Things Paradigm
In internet of things (IoT) paradigm, crowdsourcing is the process of obtaining and analyzing information or input to a particular task or project generated by a number of sources such as sensors, mobile devices, vehicles ...
Recovering Request Patterns to a CPU Processor from Observed CPU Consumption Data
Statistical queuing models are popular to analyze a computer systems ability to process different types requests. A common strategy is to run stress tests by sending artificial requests to the system. The rate ...
Detection of DNS tunneling in mobile networks using machine learning
(Springer Verlag, 2017)
Lately, costly and threatening DNS tunnels on the mobile networks bypassing the mobile operator’s Policy and Charging Enforcement Function (PCEF), has shown the vulnerability of the mobile networks caused by the Domain ...
Mobile Identity as a tool to develop society
(IEEE Press, 2015)
Dynamic Ordering of Firewall Rules Using a Novel Swapping Window-based Paradigm
(Association for Computing Machinery (ACM), 2016)
Designing and implementing efficient firewall strategies in the age of the Internet of Things (IoT) is far from trivial. This is because, as time proceeds, an increasing number of devices will be connected, accessed and ...
Enhancing Security of Cellular IoT with Identity Federation
This paper presents a Cellular Identity Federation solution which both strengthens and simplifies the authentication of Internet of Things (IoT) devices and applications by providing single sign-on between the network ...
Towards achieving a secure authentication mechanism for IoT devices in 5G networks
(IEEE conference proceedings, 2019)
Upon the new paradigm of Cellular Internet of Things, through the usage of technologies such as Narrowband IoT (NB-IoT), a massive amount of IoT devices will be able to use the mobile network infrastructure to perform their ...