Change search
Link to record
Permanent link

Direct link
Publications (2 of 2) Show all publications
Murtaza, F., Akhunzada, A., Islam, S., Boudjadar, J. & Buyya, R. (2020). QoS-aware service provisioning in fog computing. Journal of Network and Computer Applications, 165, Article ID 102674.
Open this publication in new window or tab >>QoS-aware service provisioning in fog computing
Show others...
2020 (English)In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 165, article id 102674Article in journal (Refereed) Published
Abstract [en]

Fog computing has emerged as a complementary solution to address the issues faced in cloud computing. While fog computing allows us to better handle time/delay-sensitive Internet of Everything (IoE) applications (e.g. smart grids and adversarial environment), there are a number of operational challenges. For example, the resource-constrained nature of fog-nodes and heterogeneity of IoE jobs complicate efforts to schedule tasks efficiently. Thus, to better streamline time/delay-sensitive varied IoE requests, the authors contributes by introducing a smart layer between IoE devices and fog nodes to incorporate an intelligent and adaptive learning based task scheduling technique. Specifically, our approach analyzes the various service type of IoE requests and presents an optimal strategy to allocate the most suitable available fog resource accordingly. We rigorously evaluate the performance of the proposed approach using simulation, as well as its correctness using formal verification. The evaluation findings are promising, both in terms of energy consumption and Quality of Service (QoS)

Place, publisher, year, edition, pages
Academic Press, 2020
Keywords
Cloud computing, Fog computing, Internet of everything, LRFC, Quality of experience, Quality of service, Energy utilization, Fog, Quality control, Adaptive learning, Adversarial environments, Operational challenges, Optimal strategies, Service provisioning, Smart grid, Smart layers, Task-scheduling
National Category
Natural Sciences
Identifiers
urn:nbn:se:ri:diva-45071 (URN)10.1016/j.jnca.2020.102674 (DOI)2-s2.0-85084937424 (Scopus ID)
Note

Funding details: European Commission, EC; Funding text 1: This work is supported by the European Commission , under the ASTRID and FutureTPM projects; Grant Agreements no. 786922 and 779391 , respectively.

Available from: 2020-07-01 Created: 2020-07-01 Last updated: 2025-09-23Bibliographically approved
Khan, T., Alam, M., Akhunzada, A., Hur, A., Asif, M. & Khan, M. (2019). Towards augmented proactive cyberthreat intelligence. Journal of Parallel and Distributed Computing, 124, 47-59
Open this publication in new window or tab >>Towards augmented proactive cyberthreat intelligence
Show others...
2019 (English)In: Journal of Parallel and Distributed Computing, ISSN 0743-7315, E-ISSN 1096-0848, Vol. 124, p. 47-59Article in journal (Refereed) Published
Abstract [en]

In cyber crimes, attackers are becoming more inventive with their exploits and use more sophisticated techniques to bypass the deployed security system. These attacks are targeted and are commonly referred as Advanced Persistent Threats (APTs). The currently available techniques to tackle these attacks are mostly reactive and signature based. Security Information and Event Management (SIEM), a proactive approach is the best solution. However, the major problem with SIEM is tackling huge amount of data in real time that makes it a time consuming and tedious task for security analyst. The use of threat intelligence caters to such issue by prioritizing the level of threat. In this paper, we assign risk score and confidence value to each feed generated at our product “T-Eye platform”. On the basis of these values, we assign a severity score to each feed type. Severity score assigns a level to the threat means prioritize the threat. The results, we achieved for prioritizing the threat is more apparent and accurate. In addition, we optimize the rules of IBM-Q-Radar by using threat feeds generated at T-Eye platform. Furthermore, a huge amount of false positive alarms generated at IBM Q-Radar is reduced to a certain extent.

Keywords
Confidence, IBM Q-Radar, Risk score, Rules, Severity, T-Eye feeds, T-Eye platform, Artificial intelligence, Computer programming, Radar
National Category
Natural Sciences
Identifiers
urn:nbn:se:ri:diva-36397 (URN)10.1016/j.jpdc.2018.10.006 (DOI)2-s2.0-85056154937 (Scopus ID)
Note

 Funding details: Deanship of Scientific Research, King Saud University, RG – 1439-58;

Available from: 2018-11-22 Created: 2018-11-22 Last updated: 2025-09-23Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-8370-9290

Search in DiVA

Show all publications