Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_39
Srhir Ahmed, T. Mazri
{"title":"Smart Campus Ibn Tofail Approaches and Implementation","authors":"Srhir Ahmed, T. Mazri","doi":"10.1007/978-981-16-3637-0_39","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_39","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131814546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_8
A. Semma, Y. Hannad, Mohamed El Youssfi El Kettani
{"title":"Impact of the CNN Patch Size in the Writer Identification","authors":"A. Semma, Y. Hannad, Mohamed El Youssfi El Kettani","doi":"10.1007/978-981-16-3637-0_8","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_8","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116256171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bernard Ousmane Sané, Cheikh Saliou Mbacke Babou, I. Niang
The Virtualization technologies make cloud computing desirable but they also introduce serious security risks like co-resident attack and interdependence between users on the same hypervisor. The previous works on the subject of virtualization security have some limitations: either we can not implement them, no performance evaluation or it increases the workload at servers or haven't quantitative analysis. This paper proposes a new approach to minimize Virtual machine escape attack in which the attacker's goal is to co-locate their VMs with the targets VMs on the same physical server. In order to proliferate his attack on the virtual machines of other users on the same hypervisor. Hence, we model different basic VM allocation policies using a game theoretic approach to get quantitative analysis. In each VM allocation policies, attacker's action is to decide when to start the VMs, how many VMs to start, what is the security level of its VMs. The goal of the defender will be to find a VM allocation policy that minimizes attacker's possibility. We also presented the attack efficiency, cost, coverage, power consumption and workload balance under the VM allocation policies and compute the numerical solution in CloudSim. This solution does not require any changes to the underlying infrastructure. Our results show that the Round Robin policy is the least secure allocation policy against Virtual machine escape attack. In order to minimise the efficiency rates for the attacker, the cloud provider should use a probabilistic VM allocation policy.
{"title":"A Game Theoretic Approach for Virtual Machine Allocation Security in Cloud Computing","authors":"Bernard Ousmane Sané, Cheikh Saliou Mbacke Babou, I. Niang","doi":"10.1145/3320326.3320379","DOIUrl":"https://doi.org/10.1145/3320326.3320379","url":null,"abstract":"The Virtualization technologies make cloud computing desirable but they also introduce serious security risks like co-resident attack and interdependence between users on the same hypervisor. The previous works on the subject of virtualization security have some limitations: either we can not implement them, no performance evaluation or it increases the workload at servers or haven't quantitative analysis. This paper proposes a new approach to minimize Virtual machine escape attack in which the attacker's goal is to co-locate their VMs with the targets VMs on the same physical server. In order to proliferate his attack on the virtual machines of other users on the same hypervisor. Hence, we model different basic VM allocation policies using a game theoretic approach to get quantitative analysis. In each VM allocation policies, attacker's action is to decide when to start the VMs, how many VMs to start, what is the security level of its VMs. The goal of the defender will be to find a VM allocation policy that minimizes attacker's possibility. We also presented the attack efficiency, cost, coverage, power consumption and workload balance under the VM allocation policies and compute the numerical solution in CloudSim. This solution does not require any changes to the underlying infrastructure. Our results show that the Round Robin policy is the least secure allocation policy against Virtual machine escape attack. In order to minimise the efficiency rates for the attacker, the cloud provider should use a probabilistic VM allocation policy.","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123620030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_43
A. Sayed, A. Alsalemi, Yassine Himeur, F. Bensaali, A. Amira
{"title":"Endorsing Energy Efficiency Through Accurate Appliance-Level Power Monitoring, Automation and Data Visualization","authors":"A. Sayed, A. Alsalemi, Yassine Himeur, F. Bensaali, A. Amira","doi":"10.1007/978-981-16-3637-0_43","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_43","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130267904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_15
Ikram Abourahim, M. Amghar, M. Eleuldj
{"title":"Distributed Architecture for Interoperable Signaling Interlocking","authors":"Ikram Abourahim, M. Amghar, M. Eleuldj","doi":"10.1007/978-981-16-3637-0_15","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_15","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_4
Nabila Ounasser, Maryem Rhanoui, M. Mikram, B. E. Asri
{"title":"Generative and Autoencoder Models for Large-Scale Mutivariate Unsupervised Anomaly Detection","authors":"Nabila Ounasser, Maryem Rhanoui, M. Mikram, B. E. Asri","doi":"10.1007/978-981-16-3637-0_4","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_4","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115968511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_46
Edgard Ndassimba, Nadege Gladys Ndassimba, G. M. Kossingou, S. Ouya
{"title":"Smart Agriculture Solution Based on IoT and TVWS for Arid Regions of the Central African Republic","authors":"Edgard Ndassimba, Nadege Gladys Ndassimba, G. M. Kossingou, S. Ouya","doi":"10.1007/978-981-16-3637-0_46","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_46","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125591952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_54
Naoual Nassiri, A. Lakhouaja, V. Cavalli-Sforza
{"title":"Evaluating the Impact of Oversampling on Arabic L1 and L2 Readability Prediction Performances","authors":"Naoual Nassiri, A. Lakhouaja, V. Cavalli-Sforza","doi":"10.1007/978-981-16-3637-0_54","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_54","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114482281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_18
Meriem M’dioud, R. Bannari, Ismail Elkafazi
{"title":"Reconfiguration of the Radial Distribution for Multiple DGs by Using an Improved PSO","authors":"Meriem M’dioud, R. Bannari, Ismail Elkafazi","doi":"10.1007/978-981-16-3637-0_18","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_18","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123906642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_13
A. A. Hassan, Abdelmalek El Mehdi, M. Saber
{"title":"NarrowBand-IoT and eMTC Towards Massive MTC: Performance Evaluation and Comparison for 5G mMTC","authors":"A. A. Hassan, Abdelmalek El Mehdi, M. Saber","doi":"10.1007/978-981-16-3637-0_13","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_13","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124305120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}