Refine
Year of publication
Document type
- Conference Proceeding (118)
- Article (peer-reviewed) (10)
- Part of a Book (6)
- Contribution to a Periodical (3)
- Working Paper (1)
Language
- English (138) (remove)
Has full text
- No (138) (remove)
Keywords
- Cloud computing (26)
- Security (19)
- Industry 4.0 (14)
- Privacy (8)
- Monitoring (7)
- Audit (6)
- Blockchain (6)
- Accountability (5)
- Cloud (5)
- Cloud Computing (5)
- OSGi (5)
- PaaS (5)
- AAL (4)
- Authentication (4)
- Data privacy (4)
- Docker (4)
- Internet of things (4)
- Predictive maintenance (4)
- QoS (4)
- Biometrics (3)
- Computer architecture (3)
- Digital evidence (3)
- Digital forensics (3)
- Fuzzy logic (3)
- Industrie 4.0 (3)
- SLA (3)
- Smart contracts (3)
- Software agents (3)
- Usability (3)
- Access control (2)
- Ambient assisted living (2)
- Authentication technologies (2)
- CPS (2)
- Chronicle mining (2)
- Computational modeling (2)
- Condition monitoring (2)
- Container (2)
- Container virtualization (2)
- Context aware (2)
- Continuous authentication (2)
- Distributed data validation network (2)
- Evidence (2)
- Federated cloud (2)
- Fuzzy Logic (2)
- HPC (2)
- Hardware (2)
- IaaS (2)
- Industrial internet of things (2)
- IoT (2)
- ML (2)
- MLOps (2)
- Machine learning (2)
- Maintenance (2)
- Manufacturing process (2)
- Mobile security (2)
- Modularization (2)
- Ontologies (2)
- Ontology (2)
- Quality of service (2)
- SWRL rules (2)
- Shibboleth (2)
- Simulation (2)
- System call tracing (2)
- Transparency (2)
- Transparent authentication (2)
- User authentication (2)
- Virtual machining (2)
- Virtualization (2)
- ABE (1)
- Access-control (1)
- Agent confidentiality (1)
- Agent migration (1)
- Agent trust (1)
- Agents (1)
- Anomalieerkennung (1)
- Anomalous behavior (1)
- Anomalous behaviour (1)
- Anomaly detection (1)
- Application deployment (1)
- Application software (1)
- Artificial intelligence (1)
- Artificial neural network (1)
- Artificial neural networks (1)
- Assurance (1)
- Attribute certificate (1)
- Augmentation (1)
- Authorization (1)
- Automl (1)
- Autonomous agents (1)
- Autorisierung (1)
- Availability (1)
- BLEU (1)
- Benchmark testing (1)
- Big Data (1)
- Big data (1)
- Big data frameworks (1)
- Biological neural networks (1)
- Biological system modeling (1)
- Bounding-box regression (1)
- Business (1)
- CNN (1)
- Cache (1)
- Circuit synthesis (1)
- Cloud Customer (1)
- Cloud Forensics (1)
- Cloud Provider (1)
- Cloud audits (1)
- Cloud database (1)
- Cloud forensic challenges (1)
- Cloud forensic solutions (1)
- Cloud forensics challenges (1)
- Cloud forensics solutions (1)
- Cloud infrastructure (1)
- Cloud security (1)
- Cloud service (1)
- Cloud-edge computing (1)
- Clouds (1)
- Cluster-based data validation (1)
- Coils (1)
- Container Virtualization (1)
- Context (1)
- Context enhancement protocol (1)
- Context-Awareness (1)
- Context-aware (1)
- Continuous monitoring (1)
- Convolutional generative adversarial network (1)
- Costs (1)
- Cross company business model (1)
- Customer relationship management (1)
- Cyber physical systems (1)
- Cyber security (1)
- Cybersecurity (1)
- DHT (1)
- Data acquisition (1)
- Data flow (1)
- Data protection (1)
- Data validation (1)
- Decision support systems (1)
- Deloyment (1)
- Dementia (1)
- Dementia health care (1)
- Denial of service (1)
- Deployment (1)
- Design engineering (1)
- Desktop grid (1)
- Digital Evidence (1)
- Digital Forensics (1)
- Digital forensic (1)
- Digital investigation (1)
- Digital product passport (1)
- Digital twin (1)
- Digital wallet (1)
- Digitized agreements (1)
- Distance measurement (1)
- Distributed DNN (1)
- Distributed OSGi (1)
- Distributed computing (1)
- Distributed reflection denial of service (1)
- Distributed system (1)
- Domain analysis provisioner (1)
- Dynamic VM creation (1)
- Edge Computing (1)
- Edge security (1)
- Educational institutions (1)
- Emergency-situations (1)
- Endoscopy (1)
- Energy forecast (1)
- Evidential clustering (1)
- Evolutionary strategy (1)
- Expert system (1)
- Explainable AI (1)
- Factory of the future (1)
- FastCAM (1)
- Fault prognostics (1)
- Federated identity (1)
- Federated service (1)
- Fertigung (1)
- Filter (1)
- Fog computing (1)
- Forensic acquisition (1)
- Forensic analysis (1)
- Fuzzy clustering (1)
- Fuzzy control (1)
- GAIA-X (1)
- Generative models (1)
- GreedyDual-Size (1)
- H.264 (1)
- Healthcare (1)
- High Performance Computing (1)
- Home appliances (1)
- Hybrid (1)
- Hybrid AI (1)
- Hybrid Cloud (1)
- Hyperparameter tuning (1)
- I/O isolation (1)
- IIoT (1)
- IT compliance (1)
- Identity management (1)
- Image caption generation (1)
- Image classification (1)
- Industrial blockchain (1)
- Industrial cyber physical system (1)
- Instance segmentation (1)
- Interoperability (1)
- JADE (1)
- KPI (1)
- Kernel (1)
- Knowledge-based system (1)
- LRU (1)
- LRU-MIN (1)
- LRU-threshold (1)
- Lecture capturing (1)
- Load Balancing (1)
- Load modeling (1)
- Locality aware (1)
- Log2(SIZE) (1)
- Logic circuits (1)
- METEOR (1)
- MIX (1)
- MP4 (1)
- MQTT (1)
- MUWS (1)
- Machine integration (1)
- Mathematical model (1)
- Medical services (1)
- Meta learning (1)
- Meteorology (1)
- Metric (1)
- Mobile agent security (1)
- Mobile device (1)
- Mobile devices (1)
- Modelling language (1)
- Multimodal data (1)
- NLP (1)
- Nachhaltigkeit (1)
- Natural language processing (1)
- Neural net-works (1)
- Neural network (1)
- Neuro-fuzzy (1)
- Neuronale Netze (1)
- OSGi Service Architecture (1)
- Object detection (1)
- Ontology reasoning (1)
- OpenVZ (1)
- Operating system (1)
- Optical fiber sensors (1)
- Optical fibers (1)
- Optimization (1)
- P2P (1)
- P2P communication (1)
- PaaS Management (1)
- Parallel algorithms (1)
- Partitioning algorithms (1)
- Peer-reviewed conference (1)
- Performance evaluation (1)
- Persistence (1)
- Pix2Pix (1)
- Poisoning (1)
- Poster Presentation (1)
- Prediction (1)
- Preprint (1)
- Price models (1)
- Privacy level agreement (PLA) (1)
- Privacy protection (1)
- Private cloud (1)
- Privilege management infrastructure (1)
- Protocols (1)
- Proxy (1)
- Public key cryptography (1)
- Public key infrastructure (1)
- Quality assessment (1)
- REST (1)
- Reliability (1)
- Reminisence therapy (1)
- Replacement-Algorithm (1)
- Resource Discovery (1)
- Reusable architectural patterns (1)
- Risk analysis (1)
- Rule-based-security (1)
- SIZE (1)
- SOA (1)
- SaaS (1)
- Scaling service (1)
- Scenario simulator (1)
- Security Audit as a Service (1)
- Security Zertifikat (1)
- Security monitoring (1)
- Security policies (1)
- Semantic segmentation (1)
- Semantic technology (1)
- Semantics (1)
- Sensor fusion (1)
- Servers (1)
- Service level agreement (SLA) (1)
- Shortest path problem (1)
- Sicherheit (1)
- Single sign-on (1)
- Standards organizations (1)
- Steel surface damage (1)
- Storage (1)
- Storage management (1)
- TAS (1)
- Taxonomy (1)
- Time factors (1)
- Time-Series analysis (1)
- Timing (1)
- Traceability (1)
- Training (1)
- Trust (1)
- Trust management (1)
- Universal image quality index (1)
- User centric ontology (1)
- User survey (1)
- Users' perceptions (1)
- Users’ security practices (1)
- Variety (1)
- Velocity (1)
- Veracity (1)
- Verifiability (1)
- Video format converting (1)
- Virtual cluster (1)
- Virtual instance (1)
- Virtual machine monitors (1)
- Visual attention network (1)
- Visual attention networks (1)
- Visualisation (1)
- Volume (1)
- WSDM (1)
- Web Service Ping (1)
- Web Services (1)
- XAI (1)
- e-Learning (1)