Networks and Management Laboratory

12/06/2019 08:00

(ResearchGateLinkedIn)

Psalms 24:3-5:
³ Who shall ascend the mountain of the Lord, or who shall stand in his holy place?
⁴ He who has clean hands and a pure heart, who does not give up his soul to vanity, nor swear deceitfully.
⁵ He will receive blessing from the Lord and righteousness from the God of his salvation.

Presentation at UbiSec 2022, in Zhangjiajie, China. (https://www.youtube.com/watch?v=gKEj5XF1hUE)

“Happy are those conscious of their spiritual need, since the Kingdom of the heavens belongs to them” (Matthew 5:3).

“With the grace of God, we are always better at everything with wisdom, health, peace, love, prosperity, well-being, happiness… contributing to the universe”.

Recent “papers” , “slides” , “videos” , “others” , and links with more information.

Research project:

 MAIDAM in IoT/Fog/Cloud – Mutual Authentication, Intrusion Detection and Autonomic Management in IoT/Fog/Cloud Environments and AutoManSec 4 CloudIoT – Autonomic Management and Security for Cloud and IoT

Some results:

Intensive care unit nursing workload estimation in smart hospitals

Distributed AgriFood Supply Chains

Hierarchical multistep approach for intrusion detection and identification in IoT and Fog computing-based environments

Performance of security options for message protocols: A comparative analysis

A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic

DNNET-Ensemble approach to detecting and identifying attacks in IoT environments

Intrusion detection with Machine Learning in Internet of Things and Fog Computing: problems, solutions and research

Intrusion_detection_and_prevention_in_fog_based_IoT_environments_A_systematic_literature_review

Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments

Autonomic energy management with Fog Computing

Mutual authentication with multi-factor in IoT-Fog-Cloud environment

Blockchain incentivized data forwarding in MANETs: Strategies and challenges

Hybrid approach to intrusion detection in fog-based IoT environments

Autonomic Intrusion Detection and Response Using Big Data

Order@Cloud: An agnostic meta‐heuristic for VM provisioning, adaptation, and organisation

Mutual Authentication for IoT in the Context of Fog Computing

Privacy Policies Model in Access Control

Cloud identity management: a survey on privacy strategies 

Improving cloud computing virtual machines balancing through hosts and virtual machines similarities 

Preserving Privacy with Fine-grained Authorization in an Identity Management System

A Framework and Risk Assessment Approaches for Risk-based Access Control in the Cloud 

Order@Cloud: A VM Organisation Framework Based on Multi-Objectives Placement Ranking

A Model for Managed Elements under Autonomic Cloud Computing Management

A distributed autonomic management framework for cloud computing orchestration

RACLOUDS – Model for Clouds Risk Analysis in the Information Assets Context

Cloud resource management: a survey on forecasting and profiling models 

Legacy Network Infrastructure Management Model for Green Cloud Validated Through Simulations

Operation, Management, Security and Sustainability for Cloud Computing

Green Clouds through Servers, Virtual Machines and Network Infrastructure Management

– “Provisioning, Resource Allocation, and DVFS in Green Clouds

– “Environment, Services and Network Management for Green Clouds

– ”Toward an Architecture for Monitoring Private Clouds” 

– “Intrusion Detection for Grid and Cloud Computing”

Photos at Fórum RNP:

rnp2

rnp1

CarlosRNP0