Visible to the public Citations for Hard Problems (2014 Year in Review)

SoS Newsletter- Advanced Book Block

 

 
SoS Logo

Citations for Hard Problems
(2014 Year in Review)

 

The works cited here address topics among the Hard Problems of Science of Security research, specifically Composability & Scalability, and Predictive Security Metrics. This set of references includes the reference citation; links, Digital Object Identifiers (doi's) and key words are included so that interested researchers can locate the source document. This research was presented and published in 2014.


 

Prodromos E. Tsinaslanidis, Dimitris Kugiumtzis; A Prediction Scheme Using Perceptually Important Points And Dynamic Time Warping; Expert Systems with Applications: An International Journal, Volume 41 Issue 15, November, 2014, Pages 6848-6860. Doi: 10.1016/j.eswa.2014.04.028
Keywords: Dynamic time warping, Efficient market hypothesis, Nonlinear prediction, Perceptually important points (ID#: 15-4457)
URL: http://dx.doi.org/10.1016/j.eswa.2014.04.028

 

Abul Bashar, Gerard Parr, Sally McClean, Bryan Scotney, Detlef Nauck;  Application of Bayesian Networks for Autonomic Network Management; Journal of Network and Systems Management, Volume 22 Issue 2, April 2014, Pages 174-207. Doi:   10.1007/s10922-013-9289-x
Keywords: Artificial Intelligence, Bayesian Networks, Call Admission Control, Data Mining, Intelligent Traffic Engineering, Machine Learning, Network Management, Next Generation Networks (ID#: 15-4458)
URLhttp://dx.doi.org/10.1007/s10922-013-9289-x

 

Mohammad Reza Jabbarpour, Hossein Malakooti, Rafidah Md Noor, Nor Badrul Anuar, Norazlina Khamis; Ant Colony Optimisation For Vehicle Traffic Systems: Applications And Challenges; International Journal of Bio-Inspired Computation; Volume 6 Issue 1, March 2014;  Pages 32-56.  Doi: 10.1504/IJBIC.2014.059970
Keywords:  (not provided) (ID#: 15-4459)
URLhttp://dx.doi.org/10.1504/IJBIC.2014.059970

 

Jae-wook Jang, Jiyoung Woo, Jaesung Yun, Huy Kang Kim; Mal-Netminer: Malware Classification Based On Social Network Analysis Of Call Graph; WWW Companion '14 Proceedings of the Companion Publication Of The 23rd International Conference On World Wide Web, April 2014, Pages 731-734. Doi: 10.1145/2567948.2579364 
Keywords: Degree Distribution, Dynamic analysis, malware, social network analysis (SNA), system call graph (ID#: 15-4460)
URL: http://dl.acm.org/citation.cfm?id=2579364&dl=ACM&coll=DL&CFID=532216741&CFTOKEN=86668354

 

Isredza Rahmi A. Hamid, Jemal H. Abawajy; An Approach For Profiling Phishing Activities; Computers and Security, Volume 45, September, 2014, Pages 27-41. Doi:   10.1016/j.cose.2014.04.002
Keywords: Clustering, Cybersecurity, Information security, Network security, Phishing email, Profiling(ID#: 15-4461)
URL: http://dx.doi.org/10.1016/j.cose.2014.04.002

 

Mamatha Balachandra, K. V. Prema, Krishnamoorthy Makkithaya; Multiconstrained and Multipath QoS Aware Routing Protocol for MANETs; Wireless Networks, Volume 20 Issue 8, November 2014, Pages 2395-2408. Doi:   10.1007/s11276-014-0754-6
Keywords: AOMDV, Disjoint, Link life time, MANET, MMQARP, QoS (ID#: 15-4462)
URL: http://dx.doi.org/10.1007/s11276-014-0754-6

 

Barry Mclarnon, Philip Robinson, Peter Milligan, Paul Sage; An Iterative Approach to Trustable Systems Management Automation and Fault Handling; Journal of Network and Systems Management, Volume 22 Issue 3, July 2014, Pages 366-395. Doi:  10.1007/s10922-013-9295-z  Keywords: Automation, Cloud computing, Data center, Enterprise systems, Fault handling, Systems management, Trustability (ID#: 15-4463)
URL: http://dx.doi.org/10.1007/s10922-013-9295-z

 

Pontus Johnson, Johan Ullberg, Markus Buschle, Ulrik Franke, Khurram Shahzad; An Architecture Modeling Framework For Probabilistic Prediction; Information Systems and e-Business Management, Volume 12 Issue 4, November 2014, Pages 595-622.  Doi: 10.1007/s10257-014-0241-8
Keywords: Assessment, Business properties, Object Constraint Language, Prediction, Probabilistic inference, System properties, UML (ID#: 15-4464)
URLhttp://dx.doi.org/10.1007/s10257-014-0241-8

 

Jinkeun Hong; Sec-Service Level Agreement Analysis of OFB Mode in Block Cipher; International Journal of Intelligent Information and Database Systems, Volume 8 Issue 2, July 2014, Pages 116-126. Doi: 10.1504/IJIIDS.2014.063258
Keywords:  (not provided) (ID#: 15-4465)
URL: http://dx.doi.org/10.1504/IJIIDS.2014.063258

 

Maria Leitner, Stefanie Rinderle-Ma; A Systematic Review On Security In Process-Aware Information Systems - Constitution, Challenges, And Future Directions; Information and Software Technology, Volume 56 Issue 3, March, 2014, Pages 273-293. Doi:  10.1016/j.infsof.2013.12.004
Keywords: Business Process Management, Business process security, Process-Aware Information Systems, Security, Systematic literature review, Workflow security (ID#: 15-4466)
URLhttp://dx.doi.org/10.1016/j.infsof.2013.12.004

 

Neminath Hubballi, Vinoth Suryanarayanan; Review: False Alarm Minimization Techniques In Signature-Based Intrusion Detection Systems: A Survey; Computer Communications, Volume 49, August, 2014, Pages 1-17. Doi:  10.1016/j.comcom.2014.04.012
Keywords: Correlation, False alarms, Intrusion detection (ID#: 15-4467)
URLhttp://dx.doi.org/10.1016/j.comcom.2014.04.012

 

Michael Felderer, Ina Schieferdecker; A Taxonomy of Risk-Based Testing; International Journal on Software Tools for Technology Transfer (STTT), Volume 16 Issue 5, October 2014, Pages 559-568. Doi: 10.1007/s10009-014-0332-3
Keywords: Classification, Risk analysis, Risk management, Risk-based testing, Software testing, Taxonomy (ID#: 15-4468)
URLhttp://dx.doi.org/10.1007/s10009-014-0332-3

 

Rami M. Mohammad, Fadi Thabtah, Lee Mccluskey; Predicting Phishing Websites Based On Self-Structuring Neural Network;  Neural Computing and Applications, Volume 25 Issue 2, August 2014, Pages 443-458. Doi: 10.1007/s00521-013-1490-z
Keywords: Data mining, Information security, Neural network, Phishing, Web threat (ID#: 15-4469)
URLhttp://dx.doi.org/10.1007/s00521-013-1490-z

 

Gaya K. Jayasinghe, J. Shane Culpepper, Peter Bertok; Efficient and Effective Realtime Prediction Of Drive-By Download Attacks; Journal of Network and Computer Applications, Volume 38, February, 2014, Pages 135-149. Doi:  10.1016/j.jnca.2013.03.009
Keywords: Anomaly detection, Drive-by downloads, Dynamic analysis, Machine learning, Web client exploits (ID#: 15-4470)
URL: http://dx.doi.org/10.1016/j.jnca.2013.03.009

 

Stefan Walraven, Dimitri Van Landuyt, Eddy Truyen, Koen Handekyn, Wouter Joosen; Efficient Customization Of Multi-Tenant Software-As-A-Service Applications With Service Lines; Journal of Systems and Software, Volume 91, May, 2014, Pages 48-62. Doi: 10.1016/j.jss.2014.01.021
Keywords: Multi-tenancy, SaaS, Variability (ID#: 15-4471)
URL: http://dx.doi.org/10.1016/j.jss.2014.01.021

 

Alexandre Skyrme, Noemi Rodriguez, Roberto Ierusalimschy, A Survey Of Support For Structured Communication In Concurrency Control Models; Journal of Parallel and Distributed Computing, Volume 74 Issue 4, April, 2014,  Pages 2266-2285. Doi: 10.1016/j.jpdc.2013.11.005
Keywords: Communication, Concurrency, Model, Structured, Survey (ID#: 15-4472)
URL: http://dx.doi.org/10.1016/j.jpdc.2013.11.005

 

Micah Sherr, Harjot Gill, Taher Aquil Saeed, Andrew Mao, William R. Marczak, Saravana Soundararajan, Wenchao Zhou, Boon Thau Loo, Matt Blaze; The Design And Implementation Of The A3 Application-Aware Anonymity Platform; Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 58, January, 2014,  Pages 206-227. Doi: 10.1016/j.comnet.2013.09.021
Keywords: Anonymity, Declarative networking, Extensibility, Testbeds (ID#: 15-4473)
URL: http://dx.doi.org/10.1016/j.comnet.2013.09.021

 

Weishan Zhang, Klaus Marius Hansen, Mads Ingstrup; A Hybrid Approach to Self-Management In A Pervasive Service Middleware; Knowledge-Based Systems, Volume 67, September, 2014, Pages 143-161.  Doi: 10.1016/j.knosys.2014.06.002
Keywords: Architectural styles, Change Management, Component control, Goal Management, Self-management (ID#: 15-4474)
URL: http://dx.doi.org/10.1016/j.knosys.2014.06.002

 

R. Mahindru, R. Sarkar, M. Viswanathan; Software Defined Unified Monitoring and Management of Clouds; IBM Journal of Research and Development, Volume 58 Issue 2-3, March/May 2014, Pages 12-12.  Doi: 10.1147/JRD.2014.2305313
Keywords:  IEEE keywords: Best practices;Cloud computing;Information technology;Middleware;Servers;Software defined networks;Storage area networks (ID#: 15-4475)
URL: http://dx.doi.org/10.1147/JRD.2014.2305313

 

Li Yu, Dong Li, Sparsh Mittal, Jeffrey S. Vetter; Quantitatively Modeling Application Resilience with the Data Vulnerability Factor; SC '14 Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, November 2014, Pages 695-706. Doi: 10.1109/SC.2014.62
Keywords:  IEEE keywords: data protection;pattern classification;safety-critical software;software fault tolerance;DVF;application resilience modelling;data vulnerability factor;protection mechanism;representative computational kernel;vulnerability classification;Algorithm design and analysis;Analytical models;Computational modeling;Data models;Data structures;Hardware;Resilience (ID#: 15-4476)
URLhttp://dx.doi.org/10.1109/SC.2014.62

 

Navonil Mustafee, Korina Katsaliaki, Paul Fishwick; Exploring the Modelling and Simulation Knowledge Base Through Journal Co-Citation Analysis; Scientometrics, Volume 98 Issue 3, March 2014, Pages 2145-2159. Doi:  10.1007/s11192-013-1136-z
Keywords: Co-citation analysis, Modelling and Simulation (M&S), SIMULATION: Transactions of the Society for Modeling and Simulation International, Simulation research, Society for Modeling and Simulation International (ID#: 15-4477)
URL: http://link.springer.com/article/10.1007%2Fs11192-013-1136-z

 

Qiang Lu, Justin Wilson, Yixin Chen, Christopher Gill, Louis Thomas, Gruia-Catalin Roman, Guoliang Chen; Situation-aware Composition And Execution In Dynamic Environments By Automated Planning; Engineering Applications of Artificial Intelligence, Volume 35, October, 2014, Pages 215-236. Doi: 10.1016/j.engappai.2014.06.024
Keywords: Automated planning, Coordination, Mobile environments, Workflow (ID#: 15-4478)
URL: http://dx.doi.org/10.1016/j.engappai.2014.06.024

 

Amin Jula, Elankovan Sundararajan, Zalinda Othman; Review: Cloud Computing Service Composition: A Systematic Literature Review; Expert Systems with Applications: An International Journal, Volume 41 Issue 8, June, 2014, Pages 809-3824. Doi: 10.1016/j.eswa.2013.12.
Keywords: Cloud computing service composition, Importance percentage of quality of service parameters, QoS, Quality of service parameter, Research objectives, Systematic literature review (ID#: 15-4479)
URL: http://dx.doi.org/10.1016/j.eswa.2013.12.017

 

Hassina Nacer, Djamil Aissani; Review: Semantic Web Services: Standards, Applications, Challenges And Solutions; Journal of Network and Computer Applications, Volume 44, September, 2014, Pages 134-151. Doi:  10.1016/j.jnca.2014.04.015
Keywords: Distributed middleware, Interoperability, Performance analysis, Semantic web, Web services, Web services composition (ID#: 15-4480)
URLhttp://dx.doi.org/10.1016/j.jnca.2014.04.015

 

Raffaela Mirandola, Pasqualina Potena, Patrizia Scandurra; Adaptation Space Exploration For Service-Oriented Applications; Science of Computer Programming, Volume 80, February, 2014, pages 356-384.  Doi: 10.1016/j.scico.2013.09.017
Keywords: Functional/extra-functional requirements, Optimization techniques, Service-oriented applications, Software adaptation and evolution (ID#: 15-4481)
URL: http://dx.doi.org/10.1016/j.scico.2013.09.017

 

Eduardo Gurgel Pinho, Francisco Heron De Carvalho, Junior; An Object-Oriented Parallel Programming Language For Distributed-Memory Parallel Computing Platforms; Science of Computer Programming, Volume 80, February, 2014, Pages 65-90. Doi: 10.1016/j.scico.2013.03.014
Keywords: High performance computing, Object-oriented programming languages, Parallel programming languages, Parallel programming techniques (ID#: 15-4482)
URL: http://dx.doi.org/10.1016/j.scico.2013.03.014

 

Eugene Goldberg, Panagiotis Manolios; Quantifier Elimination by Dependency Sequents; Formal Methods in System Design, Volume 45 Issue 2, October 2014, Pages 111-143. Doi: 10.1007/s10703-014-0214-z
Keywords: Dependency sequents, Model checking, Quantifier elimination, Resolution, SAT (ID#: 15-4483)
URL: http://dx.doi.org/10.1007/s10703-014-0214-z

 

Rui Zhou, Chanjuan Li, Rong Min, Qi Yu, Fei Gu, Qingguo Zhou, Jason C. Hung, Kuan-Ching Li, Xuan Wang; On Design And Formal Verification of SNSP: A Novel Real-Time Communication Protocol For Safety-Critical Applications; The Journal of Supercomputing, Volume 69 Issue 3, September 2014,  Pages 1254-1283. Doi: 10.1007/s11227-014-1157-2
Keywords: Event-triggered protocol, Fault-tolerance, Formal verification, Safe node sequence protocol, Safety (ID#: 15-4484)
URL: http://dx.doi.org/10.1007/s11227-014-1157-2

 

Andra Hugo, Abdou Guermouche, Pierre-André Wacrenier, Raymond Namyst; Composing Multiple Starpu Applications Over Heterogeneous Machines: A Supervised Approach; International Journal of High Performance Computing Applications, Volume 28 Issue 3, August 2014, Pages 285-300. Doi:  10.1177/1094342014527575
Keywords: Parallel composition, runtime optimisation, resource allocation, heterogeneous architectures, scheduling (ID#: 15-4485)
URL: http://dx.doi.org/10.1177/1094342014527575

 

Hind Benfenatki, Catarina Ferreira Da Silva, Aïcha Nabila Benharkat, Parisa Ghodous; Cloud Application Development Methodology; WI-IAT '14 Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 01, August 2014, Pages 13-20. Doi:  10.1109/WI-IAT.2014.11
Keywords: Cloud computing, Business applications development, Requirement expression, Linked services, Services reuse, Orchestration tools (ID#: 15-4486)
URL: http://dx.doi.org/10.1109/WI-IAT.2014.11


Note:

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.