Skip to main content

Cluster Computing

Ausgabe 6/2022

Inhalt (48 Artikel)

An intelligent cyber security phishing detection system using deep learning techniques

Ala Mughaid, Shadi AlZu’bi, Adnan Hnaif, Salah Taamneh, Asma Alnajjar, Esraa Abu Elsoud

Energy-aware scientific workflow scheduling in cloud environment

Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit K. Awasthi, Emmanuel S. Pilli

Natural language why-question in Business Intelligence applications: model and recommendation approach

Meriem Amel Guessoum, Rahma Djiroun, Kamel Boukhalfa, Elhadj Benkhelifa

A survey of blockchain applications in sustainable and smart cities

Shanmukha Makani, Rachitha Pittala, Eitaa Alsayed, Moayad Aloqaily, Yaser Jararweh

Multi-level just-enough elasticity for MQTT brokers of Internet of Things applications

Linh Manh Pham, Nguyen-Tuan-Thanh Le, Xuan-Truong Nguyen

Correction

Correction: Towards a distributed SaaS management system in a multi-cloud environment

Linda Ouchaou, Hassina Nacer, Chahrazed Labba

Federated recommenders: methods, challenges and future

Zareen Alamgir, Farwa K. Khan, Saira Karim

Clustering for smart cities in the internet of things: a review

Mehdi Hosseinzadeh, Atefeh Hemmati, Amir Masoud Rahmani

Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey

Sujith Samuel Mathew, Kadhim Hayawi, Nahom Aron Dawit, Ikbal Taleb, Zouheir Trabelsi

An approach of multi-objective computing task offloading scheduling based NSGS for IOV in 5G

Jie Zhang, Ming-jie Piao, De-gan Zhang, Ting Zhang, Wen-miao Dong

Optimized task scheduling in cloud computing using improved multi-verse optimizer

Mohammed Otair, Areej Alhmoud, Heming Jia, Maryam Altalhi, Ahmad MohdAziz Hussein, Laith Abualigah

An efficient resource provisioning algorithm for workflow execution in cloud platform

Madhu Sudan Kumar, Anubhav Choudhary, Indrajeet Gupta, Prasanta K. Jana

Multi-objective optimization-based privacy in data mining

Hemanta Kumar Bhuyan, Vinayakumar Ravi, M. Srikanth Yadav

Open Access

Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat

Isabel Herrera Montano, José Javier García Aranda, Juan Ramos Diaz, Sergio Molina Cardín, Isabel de la Torre Díez, Joel J. P. C. Rodrigues

Performance analysis of P2P networks with malicious nodes

Zhanyou Ma, Qiannan Si, Yilin Liu, Shunzhi Wang

A novel link-based Multi-objective Grey Wolf Optimizer for Appliances Energy Scheduling Problem

Sharif Naser Makhadmeh, Ammar Kamal Abasi, Mohammed Azmi Al-Betar, Mohammed A. Awadallah, Iyad Abu Doush, Zaid Abdi Alkareem Alyasseri, Osama Ahmad Alomari

Open Access

User behavior analysis based on edge evolutionary game model in social network

Jing Chen, Hongbo Yang, Nana Wei, Mingxin Liu

Open Access

Data governance through a multi-DLT architecture in view of the GDPR

Mirko Zichichi, Stefano Ferretti, Gabriele D’Angelo, Víctor Rodríguez-Doncel

A mixed sine cosine butterfly optimization algorithm for global optimization and its application

Sushmita Sharma, Apu Kumar Saha, Susmita Roy, Seyedali Mirjalili, Sukanta Nama

Performance evaluation of deep neural network on malware detection: visual feature approach

V. Anandhi, P. Vinod, Varun G. Menon, Korankotte Manoj Aditya

RS-chain: a decentralized reputation-sharing framework for group-buying industry via hybrid blockchain

Yungui Chen, Li Feng, Hong Liang, Shumin Yao, Liwei Tian, Xiaochen Yuan

TPEL: Task possible execution level for effective scheduling in fog–cloud environment

Mohammad Reza Alizadeh, Vahid Khajehvand, Amir Masoud Rahmani, Ebrahim Akbari

Premium Partner