In this Internet era, we have become heavily dependent on the World Wide Web and it has become a basic amenity for humans. A normal user can be trapped easily in this vicious web if not careful enough. It is a field t...
详细信息
In this Internet era, we have become heavily dependent on the World Wide Web and it has become a basic amenity for humans. A normal user can be trapped easily in this vicious web if not careful enough. It is a field that requires users to be on their toes every time they try to connect to this enormous interconnection of networks. Reports and Surveys have said that in the coming years, Cybercrime could become the biggest threat. In this proposed work, the authors have deployed applications and designed malware for the purpose of simulating various kinds of cyber-attacks so that they could study their effects & affects and ultimately devise solutions to resolve the vulnerabilities in a system. These applications included networking concepts & protocols and a software based keylogger which was developed with no malicious intent, but to analyse the architectural view or design of a malware and to study the stages of a malware attack like entry, distribution, exploitation, infection and execution. Efforts have been made to demonstrate spooting attacks with an idea of identifying vulnerabilities and security loopholes in a particular system that can be exploited by an attacker if not resolved within time.
With serverless computing offering more efficient and cost-effective application deployment, the diversity of serverless platforms presents challenges to users, including platform lock-in and costly migration. Moreove...
With serverless computing offering more efficient and cost-effective application deployment, the diversity of serverless platforms presents challenges to users, including platform lock-in and costly migration. Moreover, due to the black box nature of function computing, traditional performance benchmarking methods are not applicable, necessitating new studies. This article presents a detailed comparison of six major public cloud function computing platforms and introduces a benchmarking framework for function computing performance. This framework aims to help users make comprehensive comparisons and select the most suitable platform for their specific needs.
As a new stage in the development of the cloud computing paradigm, serverless computing has the high-level abstraction characteristic of shielding underlying details. This makes it extremely challenging for users to c...
As a new stage in the development of the cloud computing paradigm, serverless computing has the high-level abstraction characteristic of shielding underlying details. This makes it extremely challenging for users to choose a suitable serverless platform. To address this, targeting the jointcloud computing scenario of heterogeneous serverless platforms across multiple clouds, this paper presents a jointcloud collaborative mechanism called FCloudless with cross-cloud detection of the full lifecycle performance of serverless platforms. Based on the benchmark metrics set that probe performance critical stages of the full lifecycle, this paper proposes a performance optimization algorithm based on detected performance data that takes into account all key stages that affect the performance during the lifecycle of a function and predicts the overall performance by combining the scores of local stages and dynamic weights. We evaluate FCloudless on AWS, AliYun, and Azure. The experimental results show that FCloudless can detect the underlying performance of serverless platforms hidden in the black box and its optimization algorithm can select the optimal scheduling strategy for various applications in a jointcloud environment. FCloudless reduces the runtime by 23.3% and 24.7% for cold and warm invocations respectively under cost constraints.
Self-organization in natural systems demonstrates very reliable and scalable collective behavior without using any central elements. When providing collective robotic systems with self-organizing principles, we are fa...
详细信息
Self-organization in natural systems demonstrates very reliable and scalable collective behavior without using any central elements. When providing collective robotic systems with self-organizing principles, we are facing new problems of making self-organization purposeful, self-adapting to changing environments and faster, in order to meet requirements from a technical perspective. This paper describes on-going work of creating such an artificial self-organization within artificial robot organisms, performed in the framework of several European projects.
Crypto-currency is a decentralized digital currency which can be used as a medium of exchange. As it does not have any central authority, it is unregulated and a volatile asset. Globally the crypto market is worth a f...
Crypto-currency is a decentralized digital currency which can be used as a medium of exchange. As it does not have any central authority, it is unregulated and a volatile asset. Globally the crypto market is worth a few trillion dollars. The Indian crypto market suffered a lot due to a ban imposed by the Reserve Bank of India (RBI), an Indian regulatory agency, which lasted for around two years. Even after the ban and cautions issued by the RBI, the crypto market in India touched a billion dollar mark in no time. Currently, the crypto market has more than 10 million Indian investors which is growing fast as the number of exchange apps in the Indian market increase with the ease of trading in crypto. In the current research work Comparative Analysis of Crypto App in India (CACAI) has been performed and results exceed the expectations.
暂无评论