Enhancing Database Security: A Machine Learning Approach to Anomaly Detection in NoSQL Systems

JP Singh - International Journal of Information and …, 2023 - publications.dlpress.org
This paper explores the integration of machine learning, specifically recurrent neural
networks (RNNs), for automated anomaly detection within NoSQL databases. It addresses …

Generative adversarial networks for mitigating biases in machine learning systems

A Abusitta, E Aïmeur, O Abdel Wahab - ECAI 2020, 2020 - ebooks.iospress.nl
In this paper, we propose a new framework for mitigating biases in machine learning
systems. The problem of the existing mitigation approaches is that they are model-oriented …

Load balancing in edge computing using integer linear programming based genetic algorithm and multilevel control approach

R Zhang, H Shu, YD Navaei - Wireless Communications and …, 2022 - Wiley Online Library
Due to the proliferation of requests in heterogeneous resources in edge computing, the
existence of a large number of tasks and workloads in virtual machines in the edge …

A resource-based pricing collaborative approach for mitigating DDoS attack in mobile edge computing

L Chen, H Tang, W You, Y Bai - China Communications, 2022 - ieeexplore.ieee.org
Resource-constrainted and located closer to users, edge servers are more vulnerable to
Distributed Denial of Service (DDoS) attacks. In order to mitigate the impact of DDoS attacks …

Deep learning approach to security enforcement in cloud workflow orchestration

HT El-Kassabi, MA Serhani, MM Masud… - Journal of Cloud …, 2023 - Springer
Supporting security and data privacy in cloud workflows has attracted significant research
attention. For example, private patients' data managed by a workflow deployed on the cloud …

Reliability-driven task assignment in vehicular crowdsourcing: A matching game

T Halabi, M Zulkernine - 2019 49th Annual IEEE/IFIP …, 2019 - ieeexplore.ieee.org
Vehicular crowdsourcing is an emerging mobile sensing-based paradigm in which a service
platform manages the allocation of data collection and processing tasks to vehicles …

Optimal security-aware virtual machine management for mobile edge computing over 5G networks

GHS Carvalho, I Woungang, A Anpalagan… - IEEE Systems …, 2020 - ieeexplore.ieee.org
A secure execution of offloaded tasks in the 5G-driven mobile edge computing (MEC)
deployment is critical for all societal sectors. To realize it, mobile network operators have to …

Security-and location-aware optimal virtual machine management for 5G-driven MEC systems

GHS Carvalho, I Woungang, A Anpalagan… - … Conference on Wireless …, 2020 - Springer
Abstract Mobile Edge Computing (MEC) over a densified 5G wireless network deployment
arises as an effective response to the skyrocketing demand for latency-driven mobile …

Heterogeneity Model for Wireless Mobile Cloud Computing & its Future Challenges

B Aslam, R Abid, M Rizwan, F Ahmad… - 2019 International …, 2019 - ieeexplore.ieee.org
Mobile cloud computing MCC provide to a certain extent many settlement like battery timing,
memory, consistency and scalability. Though, still there some sort essential elements, those …

Streamlining Compliance: Orchestrating Automated Checks for Cloud-based AI/ML Workflows

SV Bayani, R Tillu, J Jeyaraman - Journal of Knowledge Learning and …, 2023 - jklst.org
Ensuring security and safeguarding data privacy within cloud workflows has garnered
considerable attention in research circles. For instance, protecting the confidentiality of …