| Intrusion detection systems for IoT-based smart environments: a survey |
24 |
| Task scheduling and resource allocation in cloud computing using a heuristic approach |
14 |
| Decision making in cloud environments: an approach based on multiple-criteria decision analysis and stochastic models |
8 |
| Current cloud challenges in Germany: the perspective of cloud service providers |
7 |
| Analyzing the availability and performance of an e-health system integrated with edge, fog and cloud infrastructures |
7 |
| Proactive dynamic virtual-machine consolidation for energy conservation in cloud data centres |
7 |
| Modelling trust and risk for cloud services |
6 |
| A Neuro-fuzzy approach for user behaviour classification and prediction |
6 |
| A placement architecture for a container as a service (CaaS) in a cloud environment |
5 |
| Efficient resource provisioning for elastic Cloud services based on machine learning techniques |
5 |
| Energy-aware VM placement algorithms for the OpenStack Neat consolidation framework |
5 |
| Building consumer trust in the cloud: an experimental analysis of the cloud trust label approach |
4 |
| An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment |
4 |
| QoS-based ranking and selection of SaaS applications using heterogeneous similarity metrics |
3 |
| Online architecture for predicting live video transcoding resources |
3 |
| Evaluating cloud database migration options using workload models |
3 |
| CFaaS: bilaterally agreed evidence collection |
3 |
| Publicly verifiable and efficiency/security-adjustable outsourcing scheme for solving large-scale modular system of linear equations |
2 |
| Using genetic algorithms to find optimal solution in a search space for a cloud predictive cost-driven decision maker |
2 |
| A view of programming scalable data analysis: from clouds to exascale |
2 |
| Multi-Dimensional Regression Host Utilization algorithm (MDRHU) for Host Overload Detection in Cloud Computing |
2 |
| Scalability analysis comparisons of cloud-based software services |
2 |
| LogDrive: a proactive data collection and analysis framework for time-traveling forensic investigation in IaaS cloud environments |
2 |
| Load balancing in cloud computing - A hierarchical taxonomical classification |
2 |
| Reliability and capability based computation offloading strategy for vehicular ad hoc clouds |
2 |
| Adaptive deduplication of virtual machine images using AKKA stream to accelerate live migration process in cloud environment |
2 |
| Fault tolerant software systems using software configurations for cloud computing |
2 |
| A hybrid approach to automatic IaaS service selection |
2 |
| Temperature and energy-aware consolidation algorithms in cloud computing |
2 |
| Performance of integrated workload scheduling and pre-fetching in multimedia mobile cloud computing |
1 |
| A real-world inspired multi-strategy based negotiating system for cloud service market |
1 |
| Design, simulation and testing of a cloud platform for sharing digital fabrication resources for education |
1 |
| Strand: scalable trilateration with Node.js |
1 |
| Security governance as a service on the cloud |
1 |
| The cloud application modelling and execution language |
1 |
| Energy efficient temporal load aware resource allocation in cloud computing datacenters |
1 |
| Can cloudlet coordination support cloud computing infrastructure? |
0 |
| Cloud application deployment with transient failure recovery |
0 |
| Replaceability and negotiation in a cloud service ecosystem |
0 |
| An optimization approach to capacity evaluation and investment decision of hybrid cloud: a corporate customer's perspective |
0 |
| Optimal deployment of components of cloud-hosted application for guaranteeing multitenancy isolation |
0 |
| Secure end-to-end processing of smart metering data |
0 |
| Experts reviews of a cloud forensic readiness framework for organizations |
0 |
| Multi-cloud provisioning of business processes |
0 |
| Degrees of tenant isolation for cloud-hosted software services: a cross-case analysis |
0 |