Part I Bio-inspiring Systems in Cyber Security |
|
|
1 A Bio-inspired Comprehensive Distributed Correlation Approach for Intrusion Detection Alerts and Events |
|
|
3 | (36) |
|
|
|
4 | (1) |
|
1.1.1 IDS Correlation Problem Definition |
|
|
4 | (1) |
|
1.1.2 Article Organization |
|
|
4 | (1) |
|
|
5 | (7) |
|
1.2.1 Distributed and Bio Inspired Intrusion Detection |
|
|
5 | (1) |
|
1.2.2 Distributed Correlation |
|
|
5 | (1) |
|
1.2.3 Agents in IDS and Correlation |
|
|
5 | (1) |
|
1.2.4 Comprehensive Approach Model for IDS Alert Correlation |
|
|
5 | (1) |
|
1.2.5 Distributed Agent Correlation Model |
|
|
6 | (1) |
|
1.2.6 IDSs Correlation Agents |
|
|
7 | (1) |
|
1.2.7 INFOSEC Tools Agents |
|
|
8 | (1) |
|
1.2.8 System and Application Log Agents |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
1.2.12 The Knowledge Base and Security Policy |
|
|
10 | (1) |
|
|
11 | (1) |
|
1.2.14 Implementation Scope and Performance Enhancement |
|
|
12 | (1) |
|
1.3 DACM Design and Algorithms |
|
|
12 | (15) |
|
1.3.1 IDS Alert Correlation |
|
|
12 | (1) |
|
|
13 | (2) |
|
1.3.3 DACM Individual Agents |
|
|
15 | (12) |
|
1.3.4 Implementation Environment |
|
|
27 | (1) |
|
1.4 DACM Results and Analysis |
|
|
27 | (8) |
|
|
27 | (1) |
|
1.4.2 IDS Alerts Correlation Results |
|
|
28 | (3) |
|
1.4.3 DACM Components Results |
|
|
31 | (1) |
|
1.4.4 DACM Central Agent Results |
|
|
32 | (1) |
|
1.4.5 DACM Evaluation and Assessment |
|
|
33 | (2) |
|
1.5 Conclusions and Future Work |
|
|
35 | (1) |
|
|
36 | (3) |
|
2 Bio-inspired Evolutionary Sensory System for Cyber-Physical System Security |
|
|
39 | (32) |
|
|
|
|
40 | (2) |
|
|
42 | (3) |
|
2.3 CPS Attack Detection and Resolution Techniques |
|
|
45 | (6) |
|
|
45 | (3) |
|
2.3.2 Standalone and Distributed Monitoring and Evaluation Solutions |
|
|
48 | (2) |
|
2.3.3 CPS Related Control Solutions |
|
|
50 | (1) |
|
2.4 Evolutionary Sensory System (CyPhyMASC) |
|
|
51 | (14) |
|
2.4.1 Overview of the Cell-Oriented Architecture |
|
|
51 | (1) |
|
|
52 | (1) |
|
2.4.3 CyPhyMASC Security Provisioning Methodology |
|
|
53 | (3) |
|
2.4.4 Evolutionary Sensing and Effecting Framework |
|
|
56 | (2) |
|
2.4.5 CyPhyMASC Brain Architecture |
|
|
58 | (7) |
|
2.5 Example of CyPhyMASC Security Mission |
|
|
65 | (3) |
|
2.5.1 Detection and Resolution Scenario |
|
|
66 | (1) |
|
2.5.2 CyPhyMASC Addressing the BW Attacker Assumptions |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (3) |
|
3 An Optimized Approach for Medical Image Watermarking |
|
|
71 | (22) |
|
|
|
|
|
72 | (2) |
|
|
74 | (6) |
|
3.2.1 Swarm Intelligent Optimization |
|
|
74 | (6) |
|
3.3 The Proposed Medical Watermarking Approach |
|
|
80 | (4) |
|
3.3.1 Watermark Embedding Procedure |
|
|
80 | (3) |
|
3.3.2 Watermark Extraction Procedure |
|
|
83 | (1) |
|
3.4 Experimental Results and Analysis |
|
|
84 | (5) |
|
3.4.1 Evaluation Analysis |
|
|
85 | (3) |
|
3.4.2 Convergence Comparison |
|
|
88 | (1) |
|
3.5 Conclusion and Future Works |
|
|
89 | (1) |
|
|
90 | (3) |
|
4 Bio-inspiring Techniques in Watermarking Medical Images: A Review |
|
|
93 | (22) |
|
|
|
|
|
94 | (1) |
|
4.2 Bio-inspiring Computing |
|
|
95 | (4) |
|
4.2.1 Artificial Neural Networks |
|
|
95 | (1) |
|
4.2.2 Evolutionary Algorithms |
|
|
96 | (1) |
|
4.2.3 Genetics Algorithms |
|
|
97 | (1) |
|
|
98 | (1) |
|
4.3 Medical Image Watermarking: Classification and Generic Model |
|
|
99 | (3) |
|
4.3.1 Medical Watermarking Classification |
|
|
100 | (1) |
|
4.3.2 Generic Medical Image Watermarking System |
|
|
101 | (1) |
|
4.4 BI in Medical Image Watermarking |
|
|
102 | (6) |
|
4.4.1 Artificial Neural Networks in Medical Image Watermarking |
|
|
102 | (1) |
|
4.4.2 Genetic Algorithms in Medical Image Watermarking |
|
|
103 | (1) |
|
4.4.3 Swarms Intelligent in Medical Image Watermarking |
|
|
104 | (3) |
|
4.4.4 Hybrid Bio-inspiring Systems in Medical Watermarking |
|
|
107 | (1) |
|
4.5 Watermarking Assessment Measures |
|
|
108 | (3) |
|
4.5.1 Imperceptibility or Transparency |
|
|
109 | (1) |
|
|
110 | (1) |
|
4.6 Conclusions and Future Directions |
|
|
111 | (1) |
|
|
112 | (3) |
|
5 Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking |
|
|
115 | (36) |
|
|
|
|
|
116 | (2) |
|
|
118 | (2) |
|
5.2.1 Digital Image Authentication Methods |
|
|
118 | (2) |
|
5.3 The Proposed Algorithm |
|
|
120 | (13) |
|
5.3.1 The Proposed Watermarking Scheme |
|
|
121 | (9) |
|
5.3.2 The Proposed Tamper Detection Scheme |
|
|
130 | (3) |
|
|
133 | (13) |
|
5.4.1 Watermark Quality Experiments Result |
|
|
134 | (2) |
|
5.4.2 Tamper Detection Experiments Results |
|
|
136 | (1) |
|
5.4.3 Deletion and Copy-Move Tampering Attacks |
|
|
136 | (6) |
|
5.4.4 Bit Tampering Experiments Results |
|
|
142 | (4) |
|
|
146 | (1) |
|
|
146 | (5) |
Part II Mobile Ad Hoc Networks and Key Managements |
|
|
6 TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks |
|
|
151 | (34) |
|
|
|
151 | (2) |
|
|
153 | (10) |
|
6.2.1 Mobile Ad-Hoc Networks |
|
|
153 | (8) |
|
|
161 | (2) |
|
6.3 Trusted Routing Protocols for MANETs |
|
|
163 | (6) |
|
6.3.1 Examples of Trusted Routing Protocols |
|
|
163 | (6) |
|
6.4 Trusted Ant Colony Based Routing Algorithm for Mobile Ad-Hoc Networks |
|
|
169 | (8) |
|
6.4.1 Routing Table Data Structure |
|
|
171 | (1) |
|
6.4.2 Node Trust Evaluation |
|
|
171 | (1) |
|
|
172 | (3) |
|
6.4.4 Route Selection and Route Failure Handling |
|
|
175 | (1) |
|
|
175 | (1) |
|
6.4.6 TARA Complexity Analysis |
|
|
176 | (1) |
|
6.5 Performance Evaluation of TARA |
|
|
177 | (4) |
|
6.5.1 Simulation Environment |
|
|
177 | (1) |
|
6.5.2 Simulation Results and Analysis |
|
|
178 | (3) |
|
|
181 | (1) |
|
|
182 | (3) |
|
7 An Overview of Self-Protection and Self-Healing in Wireless Sensor Networks |
|
|
185 | (18) |
|
|
|
|
185 | (1) |
|
7.2 Wireless Sensor Networks Architecture |
|
|
186 | (1) |
|
|
187 | (3) |
|
7.3.1 Autonomic Computing Characteristic |
|
|
188 | (1) |
|
7.3.2 Autonomic Computing Elements |
|
|
189 | (1) |
|
|
190 | (3) |
|
7.4.1 Self-Protection in WSN |
|
|
191 | (2) |
|
|
193 | (2) |
|
|
195 | (3) |
|
7.6.1 Existing Solution of WSN with Self-Healing |
|
|
195 | (3) |
|
7.7 BiSNET: Biologically-Inspired Architecture for Sensor NETworks |
|
|
198 | (2) |
|
|
198 | (1) |
|
7.7.2 Self-Healing in BiSNET |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (2) |
|
8 Cybercrime Investigation Challenges: Middle East and North Africa |
|
|
203 | (22) |
|
|
|
|
|
|
204 | (1) |
|
|
205 | (1) |
|
8.3 Conceptualizing Cybercrime |
|
|
205 | (1) |
|
8.4 State of Information Security in North Africa and Middle East |
|
|
206 | (2) |
|
8.4.1 Information Technology Infrastructure |
|
|
207 | (1) |
|
|
207 | (1) |
|
8.4.3 Lack of Regulations and Training of Law Enforcements |
|
|
208 | (1) |
|
8.5 Internet Users and Population Statistics for Middle East |
|
|
208 | (2) |
|
8.6 Internet Users and Population Statistics for North Africa |
|
|
210 | (3) |
|
|
213 | (6) |
|
|
213 | (1) |
|
|
214 | (2) |
|
|
216 | (2) |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (3) |
|
9 Multilayer Machine Learning-Based Intrusion Detection System |
|
|
225 | (24) |
|
|
|
|
226 | (1) |
|
|
227 | (4) |
|
9.2.1 Intrusion Detection Systems |
|
|
227 | (1) |
|
|
228 | (1) |
|
9.2.3 Principal Component Analysis |
|
|
228 | (2) |
|
9.2.4 Artificial Immune System |
|
|
230 | (1) |
|
9.2.5 Negative Selection Algorithm |
|
|
230 | (1) |
|
9.3 The Proposed Multilayer Machine Learning-Based IDS |
|
|
231 | (4) |
|
9.3.1 Layer I: Feature Selection Based Principal Components Analysis Layer |
|
|
232 | (1) |
|
9.3.2 Layer II: Anomaly Detection-Based Genetic Algorithm with Negative Selection Layer |
|
|
233 | (1) |
|
9.3.3 Layer III: Detected Anomalies Classification Layer |
|
|
234 | (1) |
|
9.4 Experimental Results and Discussion |
|
|
235 | (10) |
|
|
235 | (1) |
|
|
236 | (9) |
|
9.5 Conclusion and Future Work |
|
|
245 | (1) |
|
|
246 | (3) |
|
10 An Improved Key Management Scheme with High Security in Wireless Sensor Networks |
|
|
249 | (16) |
|
|
|
|
|
250 | (1) |
|
|
251 | (2) |
|
|
253 | (6) |
|
10.3.1 Initial INTK Setup Process |
|
|
255 | (2) |
|
10.3.2 INTK Structure Operation Algorithm |
|
|
257 | (1) |
|
10.3.3 INTK Security Feature |
|
|
258 | (1) |
|
10.4 Simulation Environment |
|
|
259 | (1) |
|
10.5 Results and Discussion |
|
|
260 | (3) |
|
|
263 | (1) |
|
|
263 | (2) |
|
11 Key Pre-distribution Techniques for WSN Security Services |
|
|
265 | (22) |
|
|
|
|
265 | (1) |
|
11.2 Security Services for the WSNs |
|
|
266 | (3) |
|
|
266 | (1) |
|
11.2.2 Data Confidentiality |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
11.2.7 Time Synchronization |
|
|
269 | (1) |
|
11.2.8 Secure Localization |
|
|
269 | (1) |
|
|
269 | (1) |
|
11.4 Security Attacks on Sensor Networks |
|
|
270 | (2) |
|
11.5 Key Distribution Techniques for Distributed WSNs |
|
|
272 | (1) |
|
11.6 Pairwise Key Distributed Schemes |
|
|
273 | (7) |
|
11.6.1 Polynomial Based Key Pre-distribution Scheme |
|
|
274 | (1) |
|
11.6.2 Probabilistic Key Pre-distribution (PRE) |
|
|
275 | (1) |
|
11.6.3 Q-Composite Random Key Pre-distribution Scheme |
|
|
276 | (1) |
|
11.6.4 Random Pairwise Keys Scheme |
|
|
276 | (1) |
|
11.6.5 Polynomial Pool-Based Key Pre-distribution Scheme |
|
|
276 | (2) |
|
11.6.6 Location Based Pairwise Key Scheme |
|
|
278 | (1) |
|
11.6.7 Time Based Pairwise Key Scheme |
|
|
279 | (1) |
|
11.7 Conclusion and Future Works |
|
|
280 | (1) |
|
|
281 | (6) |
Part III Biometrics Technology and Applications |
|
|
12 Fusion of Multiple Biometric Traits: Fingerprint, Palmprint and Iris |
|
|
287 | (34) |
|
|
|
|
|
288 | (6) |
|
12.1.1 Kinds of Information Fusion |
|
|
293 | (1) |
|
12.2 Motivation and Challenges |
|
|
294 | (3) |
|
12.2.1 Fusion of Multiple Representations of Single Biometric Trait |
|
|
294 | (1) |
|
12.2.2 Fusion of Multiple Biometric Traits |
|
|
295 | (2) |
|
|
297 | (1) |
|
12.4 Fusion of Multiple Representations of Individual Fingerprint, Palmprint and Iris |
|
|
298 | (6) |
|
12.4.1 Global Feature Extraction |
|
|
299 | (2) |
|
12.4.2 Local Feature Extraction |
|
|
301 | (1) |
|
|
302 | (2) |
|
|
304 | (1) |
|
12.5 Fusion of Multiple Biometric Traits: Fingerprint, Palmprint, Iris |
|
|
304 | (11) |
|
12.5.1 Parallel Architecture Based Fusion |
|
|
309 | (2) |
|
12.5.2 Hierarchical-Cascading Architecture Based Fusion |
|
|
311 | (4) |
|
12.6 Description of Databases |
|
|
315 | (1) |
|
12.7 Discussion and Future-Work |
|
|
316 | (2) |
|
|
318 | (3) |
|
13 Biometric Recognition Systems Using Multispectral Imaging |
|
|
321 | (28) |
|
|
|
|
|
322 | (1) |
|
|
323 | (1) |
|
13.3 Multimodal Biometric System |
|
|
324 | (1) |
|
13.3.1 Fusion at Image Level |
|
|
324 | (1) |
|
13.3.2 Fusion at Matching Score Level |
|
|
325 | (1) |
|
13.4 Multispectral Paimprint Identification |
|
|
325 | (17) |
|
13.4.1 Multispectral Palmprint Image |
|
|
325 | (1) |
|
13.4.2 Multispectral Palmprint Database |
|
|
326 | (1) |
|
13.4.3 Palmprint Preprocessing |
|
|
326 | (1) |
|
13.4.4 Unimodal Identification System Test Results |
|
|
327 | (12) |
|
13.4.5 Multimodal Identification System Test Results |
|
|
339 | (3) |
|
13.5 Reliability of Multispectral Imaging |
|
|
342 | (2) |
|
13.6 Summary and Conclusions |
|
|
344 | (1) |
|
|
345 | (4) |
|
14 Electrocardiogram (ECG): A New Burgeoning Utility for Biometric Recognition |
|
|
349 | (34) |
|
|
|
|
|
|
350 | (2) |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
352 | (1) |
|
14.2.3 The Electrical Activity of the Heart |
|
|
352 | (1) |
|
|
353 | (2) |
|
14.3.1 ECG and Biometrics |
|
|
354 | (1) |
|
|
354 | (1) |
|
|
354 | (1) |
|
14.4 Existing ECG Based Biometric Systems |
|
|
355 | (16) |
|
14.4.1 Fiducial Based Systems |
|
|
356 | (5) |
|
14.4.2 Non-Fiducial Based Systems |
|
|
361 | (6) |
|
14.4.3 Combined Fiducial and Non-fiducial Based Systems |
|
|
367 | (2) |
|
14.4.4 Fiducial Versus Non-fiducial Based Systems |
|
|
369 | (2) |
|
|
371 | (4) |
|
|
371 | (1) |
|
|
371 | (1) |
|
14.5.3 Feature Extraction |
|
|
372 | (1) |
|
|
372 | (2) |
|
|
374 | (1) |
|
14.6 Results and Discussion |
|
|
375 | (4) |
|
14.6.1 The Global Phase (Significance of the Structure Parts) |
|
|
376 | (2) |
|
14.6.2 Local Phase (Significance of Coefficients) |
|
|
378 | (1) |
|
|
379 | (1) |
|
14.7 Conclusion and Future Work |
|
|
379 | (1) |
|
|
380 | (3) |
|
15 Image Pre-processing Techniques for Enhancing the Performance of Real-Time Face Recognition System Using PCA |
|
|
383 | (40) |
|
|
|
|
384 | (3) |
|
|
387 | (7) |
|
|
387 | (1) |
|
|
387 | (3) |
|
|
390 | (1) |
|
|
390 | (1) |
|
15.2.5 Feature Selection and Extraction |
|
|
391 | (1) |
|
|
392 | (2) |
|
|
394 | (3) |
|
15.3.1 Image Preprocessing Using for Detection |
|
|
395 | (1) |
|
15.3.2 Color Conversion and Segmentation |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
|
15.3.6 Feature Extraction |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
397 | (19) |
|
|
397 | (2) |
|
|
399 | (3) |
|
15.4.3 Eyes and Mouth Identification and Localization |
|
|
402 | (5) |
|
|
407 | (5) |
|
15.4.5 Feature Extraction and Classification |
|
|
412 | (4) |
|
|
416 | (3) |
|
15.5.1 Understanding the Ratio of Training to Test Images Numbers Needed |
|
|
416 | (1) |
|
15.5.2 Changing the Training and Test Image Combination |
|
|
417 | (1) |
|
15.5.3 Calculating False Positive Rate and Sensibility |
|
|
418 | (1) |
|
15.5.4 Performance Comparison of Proposed Method with the Similar Recognition Framework |
|
|
418 | (1) |
|
|
419 | (2) |
|
|
421 | (2) |
|
16 Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues |
|
|
423 | (26) |
|
|
|
|
|
|
423 | (2) |
|
16.2 Traditional Authentication Methods |
|
|
425 | (3) |
|
16.2.1 Knowledge-Based Authentication |
|
|
425 | (2) |
|
16.2.2 Object-Based Authentication |
|
|
427 | (1) |
|
16.3 Biometric Authentication Techniques |
|
|
428 | (12) |
|
16.3.1 Biometric Authentication and Its Types |
|
|
429 | (1) |
|
16.3.2 Components of a Typical Biometric System |
|
|
429 | (1) |
|
16.3.3 How Biometric Authentication Works |
|
|
429 | (2) |
|
16.3.4 Performance Evaluation of Biometric Authentication |
|
|
431 | (1) |
|
16.3.5 Physiological Biometrics |
|
|
432 | (3) |
|
16.3.6 Behavioral Biometrics |
|
|
435 | (5) |
|
16.4 Biometric Versus Traditional Authentication |
|
|
440 | (1) |
|
16.5 Comparison Among Authentication Techniques |
|
|
440 | (1) |
|
16.6 Explicit and Implicit Authentication |
|
|
441 | (2) |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
444 | (5) |
Part IV Cloud Security and Data Services |
|
|
17 Cloud Services Discovery and Selection: Survey and New Semantic-Based System |
|
|
449 | (30) |
|
|
|
|
|
|
450 | (1) |
|
|
451 | (5) |
|
17.2.1 Cloud Service Discovery |
|
|
451 | (2) |
|
17.2.2 Cloud Service Selection |
|
|
453 | (2) |
|
17.2.3 Cloud Service Discovery and Selection |
|
|
455 | (1) |
|
17.2.4 Summary of Key Findings |
|
|
455 | (1) |
|
|
456 | (8) |
|
17.3.1 System Architecture |
|
|
456 | (1) |
|
|
456 | (3) |
|
17.3.3 Service Registration Sub-system |
|
|
459 | (1) |
|
17.3.4 Service Discovery Sub-system |
|
|
460 | (1) |
|
17.3.5 Service Non-functional Selection Sub-system |
|
|
461 | (3) |
|
17.4 Hybrid Service Matchmaking Algorithm |
|
|
464 | (4) |
|
17.5 Experimentation and Evaluation |
|
|
468 | (5) |
|
17.5.1 Experimental Setup |
|
|
468 | (1) |
|
17.5.2 Evaluation Metrics |
|
|
469 | (1) |
|
17.5.3 Experimental Scenarios |
|
|
469 | (1) |
|
17.5.4 Experimental Evaluation |
|
|
470 | (1) |
|
|
471 | (1) |
|
|
472 | (1) |
|
17.6 Conclusion and Future Work |
|
|
473 | (1) |
|
|
474 | (5) |
|
18 Data and Application Security in Cloud |
|
|
479 | (18) |
|
|
|
|
|
480 | (1) |
|
|
480 | (4) |
|
18.2.1 Security in Cloud Computing |
|
|
483 | (1) |
|
18.3 Data and Application Security |
|
|
484 | (8) |
|
18.3.1 Secure Data Transmission |
|
|
485 | (1) |
|
18.3.2 Secure Data Storage and Integrity Verification |
|
|
486 | (2) |
|
18.3.3 Prevention Against Attacks |
|
|
488 | (2) |
|
18.3.4 Isolation of Customer-Specific Data and Application |
|
|
490 | (2) |
|
|
492 | (1) |
|
|
493 | (1) |
|
|
493 | (4) |
|
19 Security Issues on Cloud Data Services |
|
|
497 | (22) |
|
|
|
|
|
|
498 | (2) |
|
|
500 | (3) |
|
19.2.1 Traditional Security Challenges |
|
|
501 | (2) |
|
|
503 | (3) |
|
|
506 | (2) |
|
19.5 Data Confidentiality |
|
|
508 | (2) |
|
19.6 Security and Trust Cloud Data Service |
|
|
510 | (4) |
|
19.6.1 EWRDN Service Model |
|
|
510 | (3) |
|
19.6.2 EWRDN Utilization of Resources |
|
|
513 | (1) |
|
|
514 | (1) |
|
|
515 | (4) |
|
20 A Reputation Trust Management System for Ad-Hoc Mobile Clouds |
|
|
519 | (22) |
|
|
|
|
520 | (1) |
|
|
521 | (1) |
|
20.3 PlanetCloud in Brief |
|
|
522 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
20.4 Proposed Trust management System for Ad-Hoc Mobile Cloud TMC |
|
|
523 | (7) |
|
|
523 | (3) |
|
|
526 | (4) |
|
20.4.3 Comparison Between TMC and Existing Trust Management Systems for MANET |
|
|
530 | (1) |
|
20.5 System Performance Test |
|
|
530 | (8) |
|
20.5.1 Performance Test: One |
|
|
531 | (1) |
|
20.5.2 Performance Test: Two |
|
|
532 | (2) |
|
20.5.3 Performance Test: Three |
|
|
534 | (4) |
|
|
538 | (1) |
|
|
538 | (3) |
|
21 Secured and Networked Emergency Notification Without GPS Enabled Devices |
|
|
541 | (24) |
|
|
|
541 | (3) |
|
21.2 Location Based Service Applications |
|
|
544 | (1) |
|
21.3 System Concepts and Related Work |
|
|
545 | (3) |
|
21.4 Location Methods and Technologies |
|
|
548 | (2) |
|
21.5 Positioning Equations |
|
|
550 | (4) |
|
21.6 Operational Considerations and Privacy |
|
|
554 | (1) |
|
21.7 A Case Study Experiment |
|
|
555 | (5) |
|
21.8 Standardization Efforts |
|
|
560 | (1) |
|
|
561 | (1) |
|
|
562 | (3) |
|
22 Towards Cloud Customers Self-Monitoring and Availability-Monitoring |
|
|
565 | |
|
|
|
|
565 | (2) |
|
22.2 Monitoring and Controlling Cloud Computing |
|
|
567 | (2) |
|
22.2.1 Monitoring and Controlling Cloud Layers |
|
|
567 | (2) |
|
22.2.2 Cloud Customer/Provider Conflict of Interests |
|
|
569 | (1) |
|
22.3 Cloud Layers Under Cloud Customer Control |
|
|
569 | (3) |
|
22.4 Cloud Service Availability |
|
|
572 | (2) |
|
22.4.1 Cloud Availability Notable Comments |
|
|
573 | (1) |
|
22.4.2 Surveying the Existing Cloud Availability Monitoring Tools |
|
|
573 | (1) |
|
22.5 Our Developed Availability Monitoring Tool |
|
|
574 | (9) |
|
22.5.1 Flowchart of Our Tool Operation |
|
|
576 | (1) |
|
22.5.2 Tool Examination in Test Environment |
|
|
576 | (6) |
|
22.5.3 Tool Accumulative Function |
|
|
582 | (1) |
|
22.6 Conclusions and Future Work |
|
|
583 | (1) |
|
|
584 | |