All Stories

  1. Impact of Decentralization on Electronic Voting Systems: A Systematic Literature Survey
  2. Discovering How to Attack a System
  3. Defending from Supply Chain Attacks
  4. Twin Based Continuous Patching To Minimize Cyber Risk
  5. TACL: Trust-Based and Scalable Access Control for IoT Using Blockchain
  6. Blockchain Smart Contract for Scalable Data Sharing in IoT: A Case Study of Smart Agriculture
  7. Blockchain-based access control management for Decentralized Online Social Networks
  8. Twin based Continuous ICT Risk Management
  9. Context-Aware and Dynamic Role-Based Access Control Using Blockchain
  10. Avoiding the weaknesses of a penetration test
  11. Security Stress: Evaluating ICT Robustness Through a Monte Carlo Method
  12. Iterative selection of countermeasures for intelligent threat agents
  13. Iterative Selection of Cost-Effective Countermeasures for Intelligent Threat Agents
  14. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
  15. Evaluating risk without data
  16. Assessing and Managing ICT Risk with Partial Information
  17. Automating the assessment of ICT risk
  18. Simulating Attack Plans Against ICT Infrastructures
  19. A Scenario Method to Automatically Assess ICT Risk
  20. GVScan: Scanning Networks for Global Vulnerabilities
  21. Assessing ICT risk through a Monte Carlo method
  22. HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems
  23. QSec: Supporting Security Decisions on an IT Infrastructure
  24. CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks
  25. CIDS: A Framework for Intrusion Detection in Cloud Systems
  26. An Obfuscation-Based Approach against Injection Attacks
  27. Attestation of integrity of overlay networks
  28. Unbounded impacts and risk mitigation in billing infrastructures
  29. A simulation-driven approach for assessing risks of complex systems
  30. Securing a Community Cloud
  31. Semantic Attestation of Node Integrity in Overlays
  32. Hierarchical, model-based risk management of critical infrastructures
  33. Transparent Process Monitoring in a Virtual Environment
  34. Modeling and Managing Risk in Billing Infrastructures
  35. PsycoTrace: Virtual and Transparent Monitoring of a Process Self
  36. Towards High Assurance Networks of Virtual Machines
  37. Measuring Semantic Integrity for Remote Attestation
  38. Semantics-Driven Introspection in a Virtual Environment
  39. Managing Critical Infrastructures through Virtual Network Communities
  40. Virtual interacting network community
  41. Secure Sharing of an ICT Infrastructure through Vinci
  42. Risk management of an information infrastructure: a framework based upon security dependencies
  43. Security and Integrity of a Distributed File Storage in a Virtual Environment
  44. Security and Integrity of a Distributed File Storage in a Virtual Environment
  45. Building Trustworthy Intrusion Detection through VM Introspection
  46. Building Trustworthy Intrusion Detection through VM Introspection
  47. Improving Responsiveness By Locality In Distributed Virtual Environments
  48. Parallel Hierarchical Radiosity: The PIT Approach
  49. Assessing the Risk of an Information Infrastructure Through Security Dependencies
  50. SEAS, a secure e-voting protocol: Design and implementation
  51. A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures
  52. SEAS: A Secure E-Voting Applet System
  53. MPI on a virtual shared memory
  54. Improving Grid Services Security with Fine Grain Policies
  55. PIT: A Library for the Parallelization of Irregular Problems
  56. Integrating load balancing and locality in the parallelization of irregular problems
  57. Collecting Remote Data in Irregular Problems with Hierarchical Representation of the Domain
  58. Hive: Implementing a Virtual Distributed Shared Memory in Java
  59. A Hierarchical Approach to Irregular Problems
  60. Parallelization of Irregular Problems Based on Hierarchical Domain Representation
  61. Adaptive Multigrid Methods in MPI
  62. Q-learning and redundancy reduction in classifier systems with internal state
  63. Massively parallel execution of logic programs: A static approach
  64. Q-Learning and Parallelism in Evolutionary Rule Based Systems
  65. A Tool for Parallel System Configuration and Program Mapping based on Genetic Algorithms
  66. Q-learning in Evolutionary Rule Based Systems
  67. P3M: A Virtual Machine Approach to Massively Parallel Computing
  68. DEBUGGING ENVIRONMNET
  69. An architectural model for OR-parallellism on distributed memory systems
  70. Parallel Implementation of a Multi-Layer Perceptron
  71. Strategies for a massively parallel implementation of simulated annealing
  72. Distributed implementation of nested communicating sequential processes: Communication and termination
  73. Parallelism issues in multi — Style computers
  74. Design of Highly Decentralized Operating Systems
  75. Development of a debugger for a concurrent language
  76. Static checking of interprocess communication in ECSP
  77. Static checking of interprocess communication in ECSP
  78. Development of a debugger for a concurrent language
  79. Development of a debugger for a concurrent language
  80. Development of a debugger for a concurrent language
  81. Two Layers Distributed Shared Memory
  82. A tool for the static optimization of concurrent programs
  83. Short Paper: Policy Driven Virtual Machine Monitor for Protected Grids
  84. Evaluation of a virtual shared memory machine by the compilation of data parallel loops
  85. DVSA and SHOE: support to shared data structures on distributed memory architectures
  86. General purpose massively parallel systems: the role of programming environments
  87. Architectural models and design methodologies for general-purpose highly-parallel computers
  88. Pisa parallel processing project on general-purpose highly-parallel computers