期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Cloud Data Center Selection Using a Modified Differential Evolution 被引量:1
1
作者 Yousef Sanjalawe Mohammed Anbar +3 位作者 Salam Al-E’mari Rosni Abdullah iznan hasbullah Mohammed Aladaileh 《Computers, Materials & Continua》 SCIE EI 2021年第12期3179-3204,共26页
The interest in selecting an appropriate cloud data center is exponentially increasing due to the popularity and continuous growth of the cloud computing sector.Cloud data center selection challenges are compounded by... The interest in selecting an appropriate cloud data center is exponentially increasing due to the popularity and continuous growth of the cloud computing sector.Cloud data center selection challenges are compounded by ever-increasing users’requests and the number of data centers required to execute these requests.Cloud service broker policy defines cloud data center’s selection,which is a case of an NP-hard problem that needs a precise solution for an efficient and superior solution.Differential evolution algorithm is a metaheuristic algorithm characterized by its speed and robustness,and it is well suited for selecting an appropriate cloud data center.This paper presents a modified differential evolution algorithm-based cloud service broker policy for the most appropriate data center selection in the cloud computing environment.The differential evolution algorithm is modified using the proposed new mutation technique ensuring enhanced performance and providing an appropriate selection of data centers.The proposed policy’s superiority in selecting the most suitable data center is evaluated using the CloudAnalyst simulator.The results are compared with the state-of-arts cloud service broker policies. 展开更多
关键词 Cloud computing data center data center selection cloud service broker differential evolution user request
下载PDF
Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges
2
作者 Salam Al-E’mari Mohammed Anbar +2 位作者 Yousef Sanjalawe Selvakumar Manickam iznan hasbullah 《Computer Systems Science & Engineering》 SCIE EI 2022年第1期87-112,共26页
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches.However,the current approaches have challenges... Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches.However,the current approaches have challenges in detecting intrusions,which may affect the performance of the overall detection system as well as network performance.For the time being,one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology.Blockchain technology moves in the direction of persistent revolution and change.It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are.Recently,blockchain was integrated into intrusion detection systems to enhance their overall performance.Blockchain has also been adopted in health-care,supply chain management,and the Internet of Things.Blockchain uses robust cryptography with private and public keys,and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party.To explore and highlight the importance of integrating blockchain with intrusion detection systems,this paper provides a comprehensive background of intrusion detection systems and blockchain technology.Furthermore,a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented.Finally,this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology. 展开更多
关键词 Blockchain intrusiondetectionsystem networksecurity maliciousattacks
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部