Green Mobile Cloud Computing 2022
DOI: 10.1007/978-3-031-08038-8_15
|View full text |Cite
|
Sign up to set email alerts
|

A Strategy for Advancing Research and Impact in New Computing Paradigms

Abstract: In the domain of information technology, new paradigms, technologies, development approaches, and application scenarios continue to emerge rapidly presenting new opportunities for researchers to pursue. Emerging paradigms are often considered to be high risk for academic research due to the immaturity of research foundation and ambiguity in fundamentals supporting the paradigm. A pragmatic and holistic strategy would be needed to systematically steer continuous development and evaluation of research in the are… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…In a cloud computing context, processing is done by cloud servers housed in data centers that offer infrastructure, software, and platforms as internet-based services rather than by local computers. In fact, cloud computing's objective is to combine hardware and software as a service that is available to consumers via the Internet [28,29]. Popular cyberattacks include denial of service attacks, distributed denial of service attacks [26], remote to local attacks [30], probing attacks, user to root attacks, adversarial attacks, poisoning and evasion attacks, botnet attacks, phishing attacks [31], spamming attacks [32] and zero-day attacks [33].…”
Section: Related Workmentioning
confidence: 99%
“…In a cloud computing context, processing is done by cloud servers housed in data centers that offer infrastructure, software, and platforms as internet-based services rather than by local computers. In fact, cloud computing's objective is to combine hardware and software as a service that is available to consumers via the Internet [28,29]. Popular cyberattacks include denial of service attacks, distributed denial of service attacks [26], remote to local attacks [30], probing attacks, user to root attacks, adversarial attacks, poisoning and evasion attacks, botnet attacks, phishing attacks [31], spamming attacks [32] and zero-day attacks [33].…”
Section: Related Workmentioning
confidence: 99%
“…In addition to saving money on infrastructure, cloud computing also frees up time and energy for employees to concentrate on running their businesses rather than maintaining their IT infrastructure. A wide range of technologies, including virtualization, autonomic-computing, grid-computing, and many more [1], have contributed to the development of cloud computing. New technologies often come with fresh problems to solve.…”
Section: Fundamentals Of Cloud Securitymentioning
confidence: 99%
“…Cloud services have emerged as an appropriate substitution for traditional computing for clients. The services provide services to clients based on their location, time, and pricing policies [1].. Through these services, clients can access the pool of configurable computing resources (applications, servers, networks, storage).…”
Section: Introductionmentioning
confidence: 99%