for Journals by Title or ISSN
for Articles by Keywords
help

Publisher: Springer-Verlag   (Total: 2345 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

        1 2 3 4 5 6 7 8 | Last   [Sort by number of followers]   [Restore default list]

Showing 1 - 200 of 2345 Journals sorted alphabetically
3D Research     Hybrid Journal   (Followers: 19, SJR: 0.214, h-index: 10)
4OR: A Quarterly J. of Operations Research     Hybrid Journal   (Followers: 9, SJR: 1.073, h-index: 25)
AAPS J.     Hybrid Journal   (Followers: 20, SJR: 1.192, h-index: 74)
AAPS PharmSciTech     Hybrid Journal   (Followers: 6, SJR: 0.718, h-index: 54)
Abdominal Imaging     Hybrid Journal   (Followers: 14, SJR: 0.723, h-index: 60)
Abhandlungen aus dem Mathematischen Seminar der Universitat Hamburg     Hybrid Journal   (Followers: 2, SJR: 0.447, h-index: 12)
Academic Psychiatry     Full-text available via subscription   (Followers: 22, SJR: 0.492, h-index: 32)
Academic Questions     Hybrid Journal   (Followers: 7, SJR: 0.135, h-index: 6)
Accreditation and Quality Assurance: J. for Quality, Comparability and Reliability in Chemical Measurement     Hybrid Journal   (Followers: 26, SJR: 0.378, h-index: 30)
Acoustical Physics     Hybrid Journal   (Followers: 10, SJR: 0.355, h-index: 20)
Acoustics Australia     Hybrid Journal  
Acta Analytica     Hybrid Journal   (Followers: 7, SJR: 0.387, h-index: 6)
Acta Applicandae Mathematicae     Hybrid Journal   (Followers: 1, SJR: 0.624, h-index: 34)
Acta Biotheoretica     Hybrid Journal   (Followers: 5, SJR: 0.419, h-index: 25)
Acta Diabetologica     Hybrid Journal   (Followers: 14, SJR: 1.318, h-index: 46)
Acta Endoscopica     Hybrid Journal   (Followers: 1, SJR: 0.113, h-index: 8)
acta ethologica     Hybrid Journal   (Followers: 4, SJR: 0.465, h-index: 23)
Acta Geochimica     Hybrid Journal   (Followers: 3)
Acta Geodaetica et Geophysica     Hybrid Journal   (Followers: 1, SJR: 0.294, h-index: 13)
Acta Geotechnica     Hybrid Journal   (Followers: 7, SJR: 1.818, h-index: 22)
Acta Informatica     Hybrid Journal   (Followers: 5, SJR: 0.524, h-index: 32)
Acta Mathematica     Hybrid Journal   (Followers: 11, SJR: 8.021, h-index: 47)
Acta Mathematica Hungarica     Hybrid Journal   (Followers: 2, SJR: 0.53, h-index: 29)
Acta Mathematica Sinica, English Series     Hybrid Journal   (Followers: 5, SJR: 0.406, h-index: 30)
Acta Mathematica Vietnamica     Hybrid Journal   (SJR: 0.451, h-index: 5)
Acta Mathematicae Applicatae Sinica, English Series     Hybrid Journal   (SJR: 0.22, h-index: 20)
Acta Mechanica     Hybrid Journal   (Followers: 19, SJR: 0.898, h-index: 52)
Acta Mechanica Sinica     Hybrid Journal   (Followers: 5, SJR: 0.426, h-index: 29)
Acta Metallurgica Sinica (English Letters)     Hybrid Journal   (Followers: 5, SJR: 0.525, h-index: 18)
Acta Meteorologica Sinica     Hybrid Journal   (Followers: 3, SJR: 0.524, h-index: 14)
Acta Neurochirurgica     Hybrid Journal   (Followers: 6, SJR: 0.833, h-index: 73)
Acta Neurologica Belgica     Hybrid Journal   (SJR: 0.348, h-index: 27)
Acta Neuropathologica     Hybrid Journal   (Followers: 3, SJR: 6.61, h-index: 117)
Acta Oceanologica Sinica     Hybrid Journal   (Followers: 3, SJR: 0.295, h-index: 17)
Acta Parasitologica     Hybrid Journal   (Followers: 9, SJR: 0.581, h-index: 28)
Acta Physiologiae Plantarum     Hybrid Journal   (Followers: 2, SJR: 0.551, h-index: 39)
Acta Politica     Hybrid Journal   (Followers: 13, SJR: 0.658, h-index: 20)
adhäsion KLEBEN & DICHTEN     Hybrid Journal   (Followers: 5, SJR: 0.103, h-index: 4)
ADHD Attention Deficit and Hyperactivity Disorders     Hybrid Journal   (Followers: 20, SJR: 0.871, h-index: 15)
Adhesion Adhesives & Sealants     Hybrid Journal   (Followers: 7)
Administration and Policy in Mental Health and Mental Health Services Research     Partially Free   (Followers: 15, SJR: 0.795, h-index: 40)
Adsorption     Hybrid Journal   (Followers: 4, SJR: 0.774, h-index: 52)
Advances in Applied Clifford Algebras     Hybrid Journal   (Followers: 3, SJR: 0.319, h-index: 15)
Advances in Atmospheric Sciences     Hybrid Journal   (Followers: 34, SJR: 0.959, h-index: 44)
Advances in Computational Mathematics     Hybrid Journal   (Followers: 15, SJR: 1.255, h-index: 44)
Advances in Contraception     Hybrid Journal   (Followers: 2)
Advances in Data Analysis and Classification     Hybrid Journal   (Followers: 53, SJR: 1.113, h-index: 14)
Advances in Gerontology     Partially Free   (Followers: 9, SJR: 0.141, h-index: 3)
Advances in Health Sciences Education     Hybrid Journal   (Followers: 23, SJR: 1.397, h-index: 42)
Advances in Manufacturing     Hybrid Journal   (Followers: 3, SJR: 0.2, h-index: 4)
Advances in Polymer Science     Hybrid Journal   (Followers: 40, SJR: 0.637, h-index: 89)
Advances in Therapy     Hybrid Journal   (Followers: 5, SJR: 0.79, h-index: 44)
Aegean Review of the Law of the Sea and Maritime Law     Hybrid Journal   (Followers: 7)
Aequationes Mathematicae     Hybrid Journal   (Followers: 2, SJR: 0.882, h-index: 23)
Aerobiologia     Hybrid Journal   (Followers: 1, SJR: 0.511, h-index: 36)
Aesthetic Plastic Surgery     Hybrid Journal   (Followers: 9, SJR: 0.821, h-index: 49)
African Archaeological Review     Hybrid Journal   (Followers: 14, SJR: 0.612, h-index: 24)
Afrika Matematika     Hybrid Journal   (Followers: 1, SJR: 0.248, h-index: 6)
AGE     Hybrid Journal   (Followers: 7, SJR: 1.358, h-index: 33)
Ageing Intl.     Hybrid Journal   (Followers: 7, SJR: 0.337, h-index: 10)
Aggiornamenti CIO     Hybrid Journal   (Followers: 1)
Aging Clinical and Experimental Research     Hybrid Journal   (Followers: 3, SJR: 0.529, h-index: 55)
Agricultural Research     Hybrid Journal   (Followers: 3)
Agriculture and Human Values     Hybrid Journal   (Followers: 12, SJR: 1.197, h-index: 49)
Agroforestry Systems     Hybrid Journal   (Followers: 19, SJR: 0.64, h-index: 56)
Agronomy for Sustainable Development     Hybrid Journal   (Followers: 10, SJR: 1.732, h-index: 59)
AI & Society     Hybrid Journal   (Followers: 6, SJR: 0.171, h-index: 19)
AIDS and Behavior     Hybrid Journal   (Followers: 13, SJR: 2.006, h-index: 71)
Air Quality, Atmosphere & Health     Hybrid Journal   (Followers: 3, SJR: 0.706, h-index: 19)
Akupunktur & Aurikulomedizin     Full-text available via subscription   (Followers: 1)
Algebra and Logic     Hybrid Journal   (Followers: 3, SJR: 0.566, h-index: 18)
Algebra Universalis     Hybrid Journal   (Followers: 2, SJR: 0.388, h-index: 22)
Algebras and Representation Theory     Hybrid Journal   (Followers: 1, SJR: 0.868, h-index: 20)
Algorithmica     Hybrid Journal   (Followers: 7, SJR: 0.898, h-index: 56)
Allergo J.     Full-text available via subscription   (Followers: 1, SJR: 0.183, h-index: 20)
Allergo J. Intl.     Hybrid Journal   (Followers: 2)
Alpine Botany     Hybrid Journal   (Followers: 4, SJR: 0.729, h-index: 20)
ALTEX : Alternatives to Animal Experimentation     Open Access   (Followers: 3, SJR: 1.392, h-index: 32)
AMBIO     Hybrid Journal   (Followers: 14, SJR: 1.094, h-index: 87)
American J. of Cardiovascular Drugs     Hybrid Journal   (Followers: 10, SJR: 0.864, h-index: 39)
American J. of Community Psychology     Hybrid Journal   (Followers: 24, SJR: 1.237, h-index: 83)
American J. of Criminal Justice     Hybrid Journal   (Followers: 7, SJR: 0.634, h-index: 13)
American J. of Cultural Sociology     Hybrid Journal   (Followers: 11, SJR: 0.283, h-index: 3)
American J. of Dance Therapy     Hybrid Journal   (Followers: 4, SJR: 0.175, h-index: 13)
American J. of Potato Research     Hybrid Journal   (Followers: 2, SJR: 0.558, h-index: 35)
American J. of Psychoanalysis     Hybrid Journal   (Followers: 21, SJR: 0.293, h-index: 13)
American Sociologist     Hybrid Journal   (Followers: 12, SJR: 0.18, h-index: 13)
Amino Acids     Hybrid Journal   (Followers: 7, SJR: 1.362, h-index: 83)
AMS Review     Partially Free   (Followers: 4)
Analog Integrated Circuits and Signal Processing     Hybrid Journal   (Followers: 5, SJR: 0.21, h-index: 37)
Analysis and Mathematical Physics     Hybrid Journal   (Followers: 4, SJR: 0.665, h-index: 7)
Analysis in Theory and Applications     Hybrid Journal  
Analysis of Verbal Behavior     Hybrid Journal   (Followers: 4)
Analytical and Bioanalytical Chemistry     Hybrid Journal   (Followers: 28, SJR: 1.096, h-index: 123)
Anatomical Science Intl.     Hybrid Journal   (Followers: 2, SJR: 0.301, h-index: 26)
Angewandte Schmerztherapie und Palliativmedizin     Hybrid Journal  
Angiogenesis     Hybrid Journal   (Followers: 3, SJR: 2.212, h-index: 69)
Animal Cognition     Hybrid Journal   (Followers: 16, SJR: 1.122, h-index: 55)
Annales françaises de médecine d'urgence     Hybrid Journal   (Followers: 1, SJR: 0.156, h-index: 4)
Annales Henri Poincaré     Hybrid Journal   (Followers: 3, SJR: 1.377, h-index: 32)
Annales mathématiques du Québec     Hybrid Journal   (Followers: 4)
Annali dell'Universita di Ferrara     Hybrid Journal   (SJR: 0.504, h-index: 14)
Annali di Matematica Pura ed Applicata     Hybrid Journal   (Followers: 1, SJR: 1.167, h-index: 26)
Annals of Behavioral Medicine     Hybrid Journal   (Followers: 12, SJR: 2.112, h-index: 98)
Annals of Biomedical Engineering     Hybrid Journal   (Followers: 18, SJR: 1.182, h-index: 94)
Annals of Combinatorics     Hybrid Journal   (Followers: 3, SJR: 0.849, h-index: 15)
Annals of Data Science     Hybrid Journal   (Followers: 8)
Annals of Dyslexia     Hybrid Journal   (Followers: 9, SJR: 0.857, h-index: 40)
Annals of Finance     Hybrid Journal   (Followers: 28, SJR: 0.686, h-index: 14)
Annals of Forest Science     Hybrid Journal   (Followers: 4, SJR: 0.929, h-index: 57)
Annals of Global Analysis and Geometry     Hybrid Journal   (Followers: 1, SJR: 1.136, h-index: 23)
Annals of Hematology     Hybrid Journal   (Followers: 14, SJR: 1.117, h-index: 62)
Annals of Mathematics and Artificial Intelligence     Hybrid Journal   (Followers: 6, SJR: 0.593, h-index: 42)
Annals of Microbiology     Hybrid Journal   (Followers: 9, SJR: 0.402, h-index: 26)
Annals of Nuclear Medicine     Hybrid Journal   (Followers: 5, SJR: 0.68, h-index: 45)
Annals of Operations Research     Hybrid Journal   (Followers: 8, SJR: 1.186, h-index: 78)
Annals of Ophthalmology     Hybrid Journal   (Followers: 9)
Annals of Regional Science     Hybrid Journal   (Followers: 7, SJR: 0.405, h-index: 42)
Annals of Software Engineering     Hybrid Journal   (Followers: 12)
Annals of Solid and Structural Mechanics     Hybrid Journal   (Followers: 10, SJR: 0.553, h-index: 8)
Annals of Surgical Oncology     Hybrid Journal   (Followers: 11, SJR: 1.902, h-index: 127)
Annals of Telecommunications     Hybrid Journal   (Followers: 7, SJR: 0.315, h-index: 25)
Annals of the Institute of Statistical Mathematics     Hybrid Journal   (Followers: 1, SJR: 0.931, h-index: 31)
Antonie van Leeuwenhoek     Hybrid Journal   (Followers: 5, SJR: 0.992, h-index: 87)
Apidologie     Hybrid Journal   (Followers: 4, SJR: 1.14, h-index: 57)
APOPTOSIS     Hybrid Journal   (Followers: 8, SJR: 1.554, h-index: 87)
Applicable Algebra in Engineering, Communication and Computing     Hybrid Journal   (Followers: 2, SJR: 0.354, h-index: 27)
Applications of Mathematics     Hybrid Journal   (Followers: 1, SJR: 0.274, h-index: 20)
Applied Biochemistry and Biotechnology     Hybrid Journal   (Followers: 44, SJR: 0.575, h-index: 80)
Applied Biochemistry and Microbiology     Hybrid Journal   (Followers: 17, SJR: 0.267, h-index: 26)
Applied Categorical Structures     Hybrid Journal   (Followers: 2, SJR: 0.361, h-index: 21)
Applied Composite Materials     Hybrid Journal   (Followers: 47, SJR: 0.705, h-index: 35)
Applied Entomology and Zoology     Partially Free   (Followers: 2, SJR: 0.554, h-index: 34)
Applied Geomatics     Hybrid Journal   (Followers: 3, SJR: 0.323, h-index: 9)
Applied Geophysics     Hybrid Journal   (Followers: 7, SJR: 0.541, h-index: 13)
Applied Intelligence     Hybrid Journal   (Followers: 12, SJR: 0.777, h-index: 43)
Applied Magnetic Resonance     Hybrid Journal   (Followers: 3, SJR: 0.358, h-index: 34)
Applied Mathematics & Optimization     Hybrid Journal   (Followers: 4, SJR: 0.955, h-index: 33)
Applied Mathematics - A J. of Chinese Universities     Hybrid Journal   (SJR: 0.275, h-index: 8)
Applied Mathematics and Mechanics     Hybrid Journal   (Followers: 4, SJR: 0.37, h-index: 26)
Applied Microbiology and Biotechnology     Hybrid Journal   (Followers: 61, SJR: 1.262, h-index: 161)
Applied Physics A     Hybrid Journal   (Followers: 7, SJR: 0.535, h-index: 121)
Applied Physics B: Lasers and Optics     Hybrid Journal   (Followers: 23, SJR: 0.983, h-index: 104)
Applied Psychophysiology and Biofeedback     Hybrid Journal   (Followers: 7, SJR: 0.677, h-index: 47)
Applied Research in Quality of Life     Hybrid Journal   (Followers: 10, SJR: 0.288, h-index: 15)
Applied Solar Energy     Hybrid Journal   (Followers: 17, SJR: 0.251, h-index: 6)
Applied Spatial Analysis and Policy     Hybrid Journal   (Followers: 4, SJR: 0.351, h-index: 9)
Aquaculture Intl.     Hybrid Journal   (Followers: 22, SJR: 0.613, h-index: 40)
Aquarium Sciences and Conservation     Hybrid Journal   (Followers: 1)
Aquatic Ecology     Hybrid Journal   (Followers: 30, SJR: 0.646, h-index: 44)
Aquatic Geochemistry     Hybrid Journal   (Followers: 3, SJR: 0.764, h-index: 39)
Aquatic Sciences     Hybrid Journal   (Followers: 12, SJR: 1.172, h-index: 53)
Arabian J. for Science and Engineering     Hybrid Journal   (Followers: 5, SJR: 0.345, h-index: 20)
Arabian J. of Geosciences     Hybrid Journal   (Followers: 1, SJR: 0.417, h-index: 16)
Archaeological and Anthropological Sciences     Hybrid Journal   (Followers: 21, SJR: 1.056, h-index: 15)
Archaeologies     Hybrid Journal   (Followers: 12, SJR: 0.397, h-index: 13)
Archiv der Mathematik     Hybrid Journal   (Followers: 1, SJR: 0.597, h-index: 29)
Archival Science     Hybrid Journal   (Followers: 52, SJR: 0.804, h-index: 22)
Archive for History of Exact Sciences     Hybrid Journal   (Followers: 7, SJR: 0.28, h-index: 15)
Archive for Mathematical Logic     Hybrid Journal   (Followers: 1, SJR: 0.946, h-index: 23)
Archive for Rational Mechanics and Analysis     Hybrid Journal   (SJR: 4.091, h-index: 66)
Archive of Applied Mechanics     Hybrid Journal   (Followers: 4, SJR: 0.865, h-index: 40)
Archives and Museum Informatics     Hybrid Journal   (Followers: 120)
Archives of Computational Methods in Engineering     Hybrid Journal   (Followers: 4, SJR: 2.841, h-index: 40)
Archives of Dermatological Research     Hybrid Journal   (Followers: 6, SJR: 0.9, h-index: 65)
Archives of Environmental Contamination and Toxicology     Hybrid Journal   (Followers: 10, SJR: 0.846, h-index: 84)
Archives of Gynecology and Obstetrics     Hybrid Journal   (Followers: 17, SJR: 0.695, h-index: 47)
Archives of Microbiology     Hybrid Journal   (Followers: 8, SJR: 0.702, h-index: 85)
Archives of Orthopaedic and Trauma Surgery     Hybrid Journal   (Followers: 8, SJR: 1.039, h-index: 56)
Archives of Osteoporosis     Hybrid Journal   (Followers: 2, SJR: 1.092, h-index: 13)
Archives of Sexual Behavior     Hybrid Journal   (Followers: 9, SJR: 1.198, h-index: 74)
Archives of Toxicology     Hybrid Journal   (Followers: 16, SJR: 1.595, h-index: 76)
Archives of Virology     Hybrid Journal   (Followers: 5, SJR: 1.086, h-index: 90)
Archives of Women's Mental Health     Hybrid Journal   (Followers: 13, SJR: 1.264, h-index: 50)
Archivio di Ortopedia e Reumatologia     Hybrid Journal  
Archivum Immunologiae et Therapiae Experimentalis     Hybrid Journal   (Followers: 2, SJR: 1.2, h-index: 42)
ArgoSpine News & J.     Hybrid Journal   (SJR: 0.102, h-index: 3)
Argumentation     Hybrid Journal   (Followers: 5, SJR: 0.295, h-index: 18)
Arid Ecosystems     Hybrid Journal   (Followers: 3)
Arkiv för Matematik     Hybrid Journal   (Followers: 1, SJR: 0.948, h-index: 22)
Arnold Mathematical J.     Hybrid Journal   (Followers: 1)
Arthropod-Plant Interactions     Hybrid Journal   (Followers: 1, SJR: 0.797, h-index: 17)
Arthroskopie     Hybrid Journal   (Followers: 1, SJR: 0.145, h-index: 8)
Artificial Intelligence and Law     Hybrid Journal   (Followers: 9, SJR: 0.288, h-index: 25)
Artificial Intelligence Review     Hybrid Journal   (Followers: 14, SJR: 0.948, h-index: 48)
Artificial Life and Robotics     Hybrid Journal   (Followers: 7, SJR: 0.231, h-index: 14)
Asia Europe J.     Hybrid Journal   (Followers: 4, SJR: 0.247, h-index: 9)
Asia Pacific Education Review     Hybrid Journal   (Followers: 9, SJR: 0.371, h-index: 17)
Asia Pacific J. of Management     Hybrid Journal   (Followers: 12, SJR: 1.676, h-index: 50)
Asia-Pacific Education Researcher     Hybrid Journal   (Followers: 11, SJR: 0.353, h-index: 13)
Asia-Pacific Financial Markets     Hybrid Journal   (Followers: 2, SJR: 0.19, h-index: 15)
Asia-Pacific J. of Atmospheric Sciences     Hybrid Journal   (Followers: 20, SJR: 1.006, h-index: 14)
Asian Business & Management     Hybrid Journal   (Followers: 7, SJR: 0.41, h-index: 10)
Asian J. of Business Ethics     Hybrid Journal   (Followers: 7)
Asian J. of Criminology     Hybrid Journal   (Followers: 5, SJR: 0.263, h-index: 8)
AStA Advances in Statistical Analysis     Hybrid Journal   (Followers: 2, SJR: 0.681, h-index: 15)
AStA Wirtschafts- und Sozialstatistisches Archiv     Hybrid Journal   (Followers: 5, SJR: 0.195, h-index: 5)
ästhetische dermatologie & kosmetologie     Full-text available via subscription  
Astronomy and Astrophysics Review     Hybrid Journal   (Followers: 21, SJR: 4.511, h-index: 44)
Astronomy Letters     Hybrid Journal   (Followers: 20, SJR: 0.58, h-index: 30)

        1 2 3 4 5 6 7 8 | Last   [Sort by number of followers]   [Restore default list]

Journal Cover Annals of Telecommunications
  [SJR: 0.315]   [H-I: 25]   [7 followers]  Follow
    
   Hybrid Journal Hybrid journal (It can contain Open Access articles)
   ISSN (Print) 1958-9395 - ISSN (Online) 0003-4347
   Published by Springer-Verlag Homepage  [2345 journals]
  • Service resizing for quick DDoS mitigation in cloud computing environment
    • Authors: Gaurav Somani; Manoj Singh Gaur; Dheeraj Sanghi; Mauro Conti; Rajkumar Buyya
      Pages: 237 - 252
      Abstract: Current trends in distributed denial of service (DDoS) attacks show variations in terms of attack motivation, planning, infrastructure, and scale. “DDoS-for-Hire” and “DDoS mitigation as a Service” are the two services, which are available to attackers and victims, respectively. In this work, we provide a fundamental difference between a “regular” DDoS attack and an “extreme” DDoS attack. We conduct DDoS attacks on cloud services, where having the same attack features, two different services show completely different consequences, due to the difference in the resource utilization per request. We study various aspects of these attacks and find out that the DDoS mitigation service’s performance is dependent on two factors. One factor is related to the severity of the “resource-race” with the victim web-service. Second factor is “attack cooling down period” which is the time taken to bring the service availability post detection of the attack. Utilizing these two important factors, we propose a supporting framework for the DDoS mitigation services, by assisting in reducing the attack mitigation time and the overall downtime. This novel framework comprises of an affinity-based victim-service resizing algorithm to provide performance isolation, and a TCP tuning technique to quickly free the attack connections, hence minimizing the attack cooling down period. We evaluate the proposed novel techniques with real attack instances and compare various attack metrics. Results show a significant improvement to the performance of DDoS mitigation service, providing quick attack mitigation. The presence of proposed DDoS mitigation support framework demonstrated a major reduction of more than 50% in the service downtime.
      PubDate: 2017-06-01
      DOI: 10.1007/s12243-016-0552-5
      Issue No: Vol. 72, No. 5-6 (2017)
       
  • An empirical study on acceptance of secure healthcare service in Malaysia,
           Pakistan, and Saudi Arabia: a mobile cloud computing perspective
    • Authors: Rooh ul Amin; Irum Inayat; Basit Shahzad; Kashif Saleem; Li Aijun
      Pages: 253 - 264
      Abstract: The advent of information and communication technology in healthcare sector has taken the world to a new pervasive horizon. Cloud computing is a ubiquitous way of information and data transfer. Implementation of cloud computing in daily healthcare operations can bring numerous benefits. However, there is a resistance towards the usage of this modern technology by healthcare organizations and staff due to lack of IT exposure, resources, infrastructure, patient data privacy, and security issues. Therefore, there is a need to provide an empirical evidence on how healthcare industry is responding to this new technology and to point out the factors that hinder its implementation in healthcare sector. In this paper, we aim to conduct an empirical study to investigate the behavioural intention of healthcare organizations’ staff, towards the usage of cloud-based healthcare services to carry out their daily jobs. We used unified theory of acceptance and use of technology (UTAUT) as a theoretical basis to test the predictors i.e. performance expectancy, effort expectancy, facilitating conditions, and social influence in order to find the behavioural intention of the healthcare organizations’ staff. Age, experience, and gender were also studied as moderators to investigate their effect on the behavioural intention of the user. An online questionnaire-based survey was conducted with 147 healthcare professionals in Malaysia, Pakistan, and Saudi Arabia. The results showed that social influence was the least influencing predictor in determining the dependent variable and the years of experience positively influenced user’s behavioural intentions towards using cloud-based healthcare services.
      PubDate: 2017-06-01
      DOI: 10.1007/s12243-016-0553-4
      Issue No: Vol. 72, No. 5-6 (2017)
       
  • Attacks and countermeasures in the internet of vehicles
    • Authors: Yunchuan Sun; Lei Wu; Shizhong Wu; Shoupeng Li; Tao Zhang; Li Zhang; Junfeng Xu; Yongping Xiong; Xuegang Cui
      Pages: 283 - 295
      Abstract: As a typical application of Internet of Things (IoT) in the field of transportation, Internet of Vehicles (IoV) aims at achieving an integrated intelligent transportation system to enhance traffics efficiency, avoid accidents, ensure road safety, and improve driving experiences by using new IoT technologies. Different from other Internet, it is characterized by dynamic topological structures, huge network scale, non-uniform distribution of nodes, and mobile limitation. Due to these characteristics, IoV systems face various types of attacks, such as authentication and identification attacks, availability attacks, confidentiality attacks, routing attacks, data authenticity attacks, etc., which result in several challenging requirements in security and privacy. Many security scientists made numerous efforts to ensure the security and privacy for the Internet of Vehicles in recent years. This paper aims to review the advances on issues of security and privacy in IoV, including security and privacy requirements, attack types, and the relevant solutions, and discuss challenges and future trends in this area.
      PubDate: 2017-06-01
      DOI: 10.1007/s12243-016-0551-6
      Issue No: Vol. 72, No. 5-6 (2017)
       
  • Modeling network traffic for traffic matrix estimation and anomaly
           detection based on Bayesian network in cloud computing networks
    • Authors: Laisen Nie; Dingde Jiang; Zhihan Lv
      Pages: 297 - 305
      Abstract: With the rapid development of a cloud computing network, the network security has been a terrible problem when it provides much more services and applications. Network traffic modeling and analysis is significantly crucial to detect some lawless activities such as DDoS, virus and worms, and so on. Meanwhile, it is a common approach for acquiring a traffic matrix, which can be used by network operators to carry out network management and planning. Although a great number of methods have been proposed to model and analyze the network traffic, it is still a remarkable challenge since the network traffic characterization has been tremendously changed, in particular, for a cloud computing network. Motivated by that, we analyze and model the statistical features of network traffic based on the Bayesian network in this paper. Furthermore, we propose an accurate network traffic estimation approach and an efficient anomaly detection approach, respectively. In detail, we design a Bayesian network structure to model the causal relationships between network traffic entries. Based on this Bayesian network model, we obtain a joint probability distribution of network traffic by the maximum a posteriori approach. Then, we estimate the network traffic in terms of a regularized optimization model. Meanwhile, we also perform anomaly detection based on the proposed Bayesian network structure. We finally discuss the effectiveness of the proposed method for traffic matrix estimation and anomaly detection by applying it to the Abilene and GÉANT networks.
      PubDate: 2017-06-01
      DOI: 10.1007/s12243-016-0546-3
      Issue No: Vol. 72, No. 5-6 (2017)
       
  • EACF: extensible access control framework for cloud environments
    • Authors: Faria Mehak; Rahat Masood; Muhammad Awais Shibli; Islam Elgedway
      Pages: 307 - 323
      Abstract: The dynamic authorization and continuous monitoring of resource usage in cloud environments is a challenge. Moreover, the extant access control techniques are not well-suited for all types of the cloud-hosted applications predominantly for two reasons. Firstly, these techniques lack in providing features such as generality, extensibility, and flexibility. Secondly, they are static in nature, such that once the user is authorized, they do not evaluate the access request during and after the resource usage. Every application hosted in the cloud has its own requirement of evaluating access request; some applications require request evaluation before assigning resources, while some require continuous monitoring of resource usage along with a dynamic update of attribute values. To address these diverse requirements, we present an Extensible Access Control Framework (EACF) for cloud-based applications, which provides high-level extensibility by incorporating different access control models about the needs of the Cloud service consumers (organizations). A number of access control models are combined in the EACF, which provides reliable authorization service for managing and controlling access to the software as a service-hosted cloud applications.It also helps cloud consumers to provide authorized access to resources (data), as well as contributes to eliminate the need to write customized security code for individual applications. As a case study, three access control models are incorporated into the framework and tested on SaaS-hosted application DSpace to ascertain that the proposed features are functional and working fine.
      PubDate: 2017-06-01
      DOI: 10.1007/s12243-016-0548-1
      Issue No: Vol. 72, No. 5-6 (2017)
       
  • Security and management framework for an organization operating in cloud
           environment
    • Authors: Nasir Raza; Imran Rashid; Fazeel Ali Awan
      Pages: 325 - 333
      Abstract: Cloud computing has attained tremendous popularity recently, leading to its fast and rapid deployment. However, privacy and security concerns have also increased in the same ratio. The adoption of cloud model has revealed new dimensions of attack, demanding major reconsideration and reevaluation of traditional security mechanisms. If an organization is operating in cloud environment without adopting essential security measures, it may face catastrophic consequences including loss of valuable data, financial damages, or reputation loss etc. Any organization in cloud architecture faces severe security threats and challenges for which a comprehensive security framework is needed. Certain frameworks exist in literature which focus deeply on specific cloud security issues; however, there is a dire need of comprehensive framework encompassing both security-related and management-related issues. This paper initially reviews security challenges and threats to data/applications in cloud environment. Furthermore, a comprehensive security and management framework is proposed for an organization operating in cloud environment. Proposed framework has been implemented in virtualized cloud environment to validate the efficacy of certain features of the model. The data center has been setup in virtualized environment through virtual machines on VMware ESXi-6 hypervisor layer. VMware vCloud-6 has been installed on top of it for provision of services to the users. The proposed framework is a set of guidelines that will adequately secure the organization’s data and applications. The framework incorporates a layered security architecture to achieve utmost level of security for nullifying the impact of threats.
      PubDate: 2017-06-01
      DOI: 10.1007/s12243-017-0567-6
      Issue No: Vol. 72, No. 5-6 (2017)
       
  • Software-defined systems support for secure cloud computing based on data
           classification
    • Authors: Yaser Jararweh; Mahmoud Al-Ayyoub; Lo’ai Tawalbeh; Ala’ Darabseh; Houbing Song
      Pages: 335 - 345
      Abstract: The newly emerged Software-Defined Systems (SDSs) promised to reduce computing systems management complexity. This can be achieved by separating the control plane from the data plane. On the other hand, cloud computing usage proliferation creates new challenges for managing user data efficiently. Such challenges include data ownership, data access policies, data privacy and integrity, and the availability of storage space. Using encryption-based solution is effective but very costly. Other solutions that used data classification based on the data priority can mitigate the high cost problem for data encryption. However, managing such data classification systems is very complex. In this paper, we are introducing a Software-Defined System-based solution for deploying efficient data classification framework. Our results show the superiority of the proposed model.
      PubDate: 2017-06-01
      DOI: 10.1007/s12243-016-0549-0
      Issue No: Vol. 72, No. 5-6 (2017)
       
  • IT governance and risk mitigation approach for private cloud adoption:
           case study of provincial healthcare provider
    • Authors: Ayo Gbadeyan; Sergey Butakov; Shaun Aghili
      Pages: 347 - 357
      Abstract: Cloud computing (CC) has the potential to provide significant benefits to healthcare organizations; however, its susceptibility to security and privacy apprehensions needs to be addressed before its adoption. It is important to evaluate the risks that arise from CC prior to its adoption in healthcare projects. Failure to evaluate security and privacy concerns could result in regulatory penalties, reputation loss, financial issues, and public loss of confidence in the healthcare provider. This paper uses Alberta’s Privacy Impact Assessment (PIA) requirement and COBIT 5 for Risk as guidance to highlight CC risk assessment areas and presents an IT governance and risk mitigation approach useful for CC adoption in the healthcare industry. In compliance with Alberta’s Health Information Act (HIA), the risk assessment areas are analyzed based on the security triad with emphasis on the confidentiality principle where privacy is the main focus. The proposed approach presented in this paper can be utilized by healthcare providers to mitigate and continuously evaluate CC risks from an IT governance perspective. Although the case study uses Canadian regulations, similar considerations can be taken into account in other jurisdictions.
      PubDate: 2017-06-01
      DOI: 10.1007/s12243-017-0568-5
      Issue No: Vol. 72, No. 5-6 (2017)
       
  • Comiqual: collaborative measurement of internet quality
    • Authors: Marc Ibrahim; Maroun Chamoun; Rima Kilany; Melhem El Helou; Nicolas Rouhana
      Abstract: With the continuous growth of both fixed and mobile Internet usage, measuring the Internet QoS (quality of service) becomes of vital interest for all involved Internet stakeholders, mainly consumers, operators, and regulators. In this paper, we describe in detail, Comiqual (collaborative measurement of Internet quality), a crowd-sourced large-scale Internet measurement platform that coordinates and collects measurements from measurement agents (MAs) installed on fixed and mobile end user devices. Although the initial and main target of Comiqual is Lebanon, the platform is generically designed to measure the Internet access quality from the user’s perspective anywhere on the globe. The MAs that execute mainly active measurements are jointly controlled by users and by a measurement center (MC); the latter sends measurement instructions to MAs and collects the measurement results. The communication protocol between MC and MAs uses JSON messages that are exchanged via HTTP through REST calls and secured by HTTPS. Measurement results could be openly accessed in a raw format or viewed as an aggregation via a Google map. Moreover, an online statistical tool allows user-defined statistics computation and visualization. All these features combined with the flexibility of the platform management are the main drivers that will allow Comiqual to reach its ultimate goal, which is to create a collaborative, neutral, and transparent observatory of the Internet.
      PubDate: 2017-06-17
      DOI: 10.1007/s12243-017-0585-4
       
  • Cloud RAN challenges and solutions
    • Authors: Rajeev Agrawal; Anand Bedekar; Troels Kolding; Vishnu Ram
      Abstract: In this paper, we take an overall look at key technical challenges in the evolution of the radio access network (RAN) architecture towards Cloud RAN and solutions to overcome them. To address fronthaul limitations, we examine the implications and tradeoffs enabled by functional splits on fronthaul needs, system performance, and centralization scale. We examine the architecture of algorithms for multi-cell coordination and implications in a Cloud RAN environment. To maximize the use of general-purpose processors (GPP) and operating systems such as Linux for Cloud RAN, we propose methods of achieving real-time performance suitable for RAN functions. To enable right-sizing the amount of compute used for various RAN functions based on the workload, we propose methods of pooling and elastic scaling for RAN functions that exploit the fact that certain RAN functions perform per-user operations while others perform per-cell operations. Cloud RAN also aims to use cloud management technologies such as virtualized infrastructure management (VIM) and orchestration for automating the instantiation and scaling of RAN functions. We identify special needs for RAN arising from real-time constraints and a mix of GPP and non-GPP hardware. In the evolution towards 5G, we propose the use of Cloud-RAN-based multi-connectivity anchoring to address processing bottlenecks in a scalable manner. We identify opportunities for optimization across RAN and other network layers enabled by the distributed edge cloud architecture.
      PubDate: 2017-06-12
      DOI: 10.1007/s12243-017-0584-5
       
  • Consensus-based resource allocation among objects in the internet of
           things
    • Authors: Virginia Pilloni; Luigi Atzori
      Abstract: The pervasive use of smart objects is encouraging the development of the Internet of Things (IoT) vision, where even the most common and simple object is expected to acquire information from the surrounding ambient and to cooperate with other objects to achieve a common goal . In such a heterogeneous and complex scenario, optimal allocation of resources to application tasks (e.g., available energy, computing speed, storage capacity) is paramount to fairly distribute them and not overload some objects. In this paper, we focus on finding the optimal assignment to the physical devices that can perform the same task needed by the running applications. To this, we rely on the technologies that have been already developed around the notion of Virtual Object (VO), which is the digital counterpart of the physical object and is used to augment its functionalities with the use of virtualization technologies. Our contribution is twofold. Firstly, we extend the current functionalities of VOs to make them capable of implementing a distributed strategy for the allocation of tasks among objects: the information model is enhanced to include the Quality of Information (QoI) notion and the possible different architectural solutions are presented. Secondly, we propose a distributed algorithm where VOs negotiate to reach a consensus on resources allocation, in order to distribute the workload among the objects that can cooperate to the same task and to ensure that the QoI requirements are fulfilled. Simulation results show that, compared to a static frequency allocation, the algorithm enhances the performance of the system with an average improvement of 27% in network lifetime and confirms the compliance to QoI requirements.
      PubDate: 2017-05-30
      DOI: 10.1007/s12243-017-0583-6
       
  • Discrimination rate: an attribute-centric metric to measure privacy
    • Authors: Louis Philippe Sondeck; Maryline Laurent; Vincent Frey
      Abstract: As far as we know, there is no good privacy metric for quantifying how privacy-efficient an anonymity system is. This paper discusses first the features needed for defining such a metric and proposes a new metric based on information theory and named DR for Discrimination Rate. The DR is the first metric enabling some fine-grained measurements down to the attribute level to quantify the attribute identification capacity with a score scaling from 0 to 1 for any given anonymity system. The DR can be easily applied in practice, thanks to the algorithms provided in the paper. The DR measurement onto attributes enables to reflect the attacker’s capacity, and to evaluate how much the attribute is able to refine the anonymity set. The formalization brought by the DR permits to give more accurate definitions of identifiers and to introduce new notions like sketchy-identifiers, zero-identifiers, and partial-identifiers. Finally, the usefulness and practical dimensions of the DR are illustrated through evaluation and comparison of the k-anonymity and l-diversity mechanisms over a dataset.
      PubDate: 2017-05-29
      DOI: 10.1007/s12243-017-0581-8
       
  • An android malware dynamic detection method based on service call
           co-occurrence matrices
    • Authors: Chundong Wang; Zhiyuan Li; Xiuliang Mo; Hong Yang; Yi Zhao
      Abstract: With the market share of Android mobile devices increasing, Android has come to dominate the smartphone operating system market. It also draws the attention of malware authors and researchers. The number of Android malicious applications is constantly increasing. However, due to the limitations of static detection in code obfuscation and dynamic loading, the current research of Android malicious code detection needs to be deeply studied in dynamic detection. In this paper, a new Android malware identification method is proposed. This method extracts the feature of Android system service call sequences by using a co-occurrence matrix and uses machine-learning algorithm to classify the feature sequence and to verify whether this feature sequence can expose Android malware behaviors or not. By using 750 malware samples and 1000 benign samples, this paper has designed an experiment to evaluate this method. The results show that this method has a high detection precision rate (97.1%) in the best case and a low false-positive rate (2.1%) in the worst case based on the system service call co-occurrence matrix.
      PubDate: 2017-05-13
      DOI: 10.1007/s12243-017-0580-9
       
  • Penalty migration as a performance signaling method in energy-efficient
           clouds
    • Authors: Marat Zhanikeev
      Abstract: The concept of energy efficiency in clouds has gradually evolved and now includes not only traditional CPU and memory utilizations but also network traffic, number of migrations, etc. Recent literature also shows that the most energy efficient migration schedule is one that, in addition to minimizing migration count, also manages to vacate the most physical machines, thus allowing them to be powered down. While it is obvious that such migration schedules depend on frequent changes in VM-to-PM mapping layouts, existing literature does not offer any practical strategies to that effect. This paper retains the basic notion that lowering the number of migrations and powering down PMs contribute to a level of energy efficiency, but also proposes a new notion called penalty migration. In this paper, the Service and the Cloud have an SLA that spells out an effective range of operations for the Service’s applications, which, if the range is exceeded, can be penalized by the Cloud in several ways discussed in this paper. In addition to higher fluidity, the proposed strategies also improve QoS from the viewpoint of the Cloud’s resources as well as individual service populations. In turn, services can benefit from penalty migrations, treating migration events as QoS monitoring data. This proposal is the first known attempt to distribute the task of performance management between cloud and service providers, where penalty migrations are a form of signaling between the two roles.
      PubDate: 2017-05-10
      DOI: 10.1007/s12243-017-0577-4
       
  • Horizon: a QoS management framework for SDN-based data center networks
    • Authors: Junjie Pang; Gaochao Xu; Xiaodong Fu; Kuo Zhao
      Abstract: Data center networks (DCNs), which serve as the infrastructural backbone of big data, have been receiving increasing attention recently. To improve the service quality of data centers, researchers have been working on congestion control, network monitoring, and performance optimization. However, most such works focus on user-centric service quality, which means that the quality of network service itself is not factored into the quality of service (QoS) problem. In this study, we illustrate the problem of data center operations and management as a new type of QoS that is the foundation of user-centric QoS implementation. Inspired by traditional works on network performance optimization, we define the quality of network service in a software-defined networking (SDN)-based DCN and develop a framework called Horizon as the architecture of our QoS solution. This framework comprises a Markov-process-based method to predict link popularity, and we use SDN technology to monitor network status. We implement the proposed method, and the experimental results indicate that Horizon can relieve congestion in DCNs to meet QoS requirements. The experimental results show that our approach has a similar performance to the optimal solution. When compared with the ECMP approach, our approach has a much lower latency. The results also show that the proposed approach is effective in terms of network congestion control.
      PubDate: 2017-05-04
      DOI: 10.1007/s12243-017-0579-2
       
  • Security and privacy issues in cloud computing
    • Authors: Haider Abbas; Olaf Maennel; Saïd Assar
      PubDate: 2017-04-21
      DOI: 10.1007/s12243-017-0578-3
       
  • Efficient designated server identity-based encryption with conjunctive
           keyword search
    • Authors: Yang Lu; Gang Wang; Jiguo Li; Jian Shen
      Abstract: Public key encryption with keyword search is a useful primitive that provides searchable ciphertexts for some predefined keywords. It allows a user to send a trapdoor to a storage server, which enables the latter to locate all encrypted data containing the keyword(s) encoded in the trapdoor. To remove the requirement of a secure channel between the server and the receiver in identity-based encryption with keyword search, Wu et al. proposed a designated server identity-based encryption scheme with keyword search. However, our cryptanalysis indicates that Wu et al.’s scheme fails in achieving the ciphertext indistinguishability. To overcome the security weakness in the scheme and offer the multiple-keyword search function, we put forward a designated server identity-based encryption scheme with conjunctive keyword search. In the random oracle model, we formally prove that the proposed scheme satisfies the ciphertext indistinguishability, the trapdoor indistinguishability and the off-line keyword-guessing attack security. Comparison analysis shows that it is efficient and practical.
      PubDate: 2017-04-21
      DOI: 10.1007/s12243-017-0574-7
       
  • The three-dimensional model for dependability integration in cloud
           computing
    • Authors: Wiem Abderrahim; Zied Choukair
      Abstract: Dependability is one of the highly crucial issues in cloud computing environments given the serious impact of failures on user experience. Cloud computing is a complex system based on virtualization and large scalability, which makes it a frequent place for failure. In order to fight against failures in a cloud, we assure dependability differently from the common way where the focus of fault management is on the Infrastructure as a Service and on the cloud provider side only. We propose a model that integrates dependability with respect to three dimensions according to The Open Group Architecture Framework principles. These dimensions involve various cloud actors (consumer, provider, and broker). They take into consideration the interdependency between the cloud service models (Infrastructure as a Service, Platform as a Service, and Software as a Service) and the different architecture levels (contextual, design, logical, procedural, and operations). DMD proves an enhancement of dependability attributes compared to classically designed and executed cloud systems.
      PubDate: 2017-04-20
      DOI: 10.1007/s12243-017-0576-5
       
  • Subjective perception scoring: psychological interpretation of network
           usage metrics in order to predict user satisfaction
    • Authors: Jörg Niemöller; Nina Washington
      Abstract: Experiences of users determine their actions and therefore have great influence on the business result of service providers. Thus, it is highly important to know and control these experiences. Decisions and actions are most effective if they are based on individual users and their detailed experience history. Currently available methods for measuring user experience fail in providing sufficient detail or continuous availability. This paper introduces a big data analytics method, which predicts every user’s satisfaction with the service provider. This is performed using an analytics algorithm, adding psychological interpretation to the measured and individually perceived user’s quality of experience. The result is a score that enables individualized marketing and allows understanding the cause of dissatisfaction. It is also able to assign a subjective quality score to network assets.
      PubDate: 2017-04-20
      DOI: 10.1007/s12243-017-0575-6
       
  • Securing wireless sensor networks for improved performance in cloud-based
           environments
    • Authors: Ashfaq Hussain Farooqi; Farrukh Aslam Khan
      Abstract: Cloud computing has a great potential to assist in storing and processing data collected from sensors placed in any environment such as smart homes, vehicles, hospitals, enemy surveillance areas, volcanoes, oceans, etc. The sensors may be implanted in the form of a body sensor network or placed in the surroundings. The data recorded by these sensors may further be used for several applications implemented in the cloud as well as other services. Here, the data is acquired from sensors through the wireless medium. Recent studies show that wireless sensor networks (WSNs) are vulnerable to various kinds of security threats and there is a requirement of a security solution that safeguards them from lethal attacks. In this paper, we modify the low-energy adaptive clustering hierarchy (LEACH) protocol for WSNs and add the functionality of intrusion detection to secure WSNs from sinkhole, black hole, and selective forwarding attacks. The modified protocol is called LEACH++. We perform two types of analyses: numerical analysis to check the effect on throughput and energy, and simulations in Network Simulator-2 (NS-2) to prove the results found from the numerical analysis. The results are quite promising and favor LEACH++ over LEACH under attack with respect to throughput and energy consumption.
      PubDate: 2017-03-22
      DOI: 10.1007/s12243-017-0566-7
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.224.247.75
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016