—Network Functions Virtualization (NFV) opens new opportunities and challenges for security community. Unlike existing physical network infrastructure, in a virtualized network p...
Hyunsu Jang, Jaehoon Jeong, Hyoungshick Kim, Jung-...
In recent years, cloud environments are becoming more and more interesting and useful for the execution and the deployment of business processes. Indeed, it enables organizations t...
—The Internet is currently undergoing a significant change. The majority of Internet transfers have historically occurred between wired network devices. The popularity of WiFi, ...
—This paper proposes a Smart e-Bus Battery SUbstibution Scheme (called SBUS), tailored and optimized for the commute service of e-Buses using a cloud-based management system. To ...
Jihyeok Seo, Jaehoon Jeong, Hyoungshick Kim, Jung-...
—Recent trends on how video games are played have pushed for the need to revise the game engine architecture. Indeed, game players are more mobile, using smartphones and tablets ...
—Social interactions in multiplayer online games are an essential feature for a growing number of players world-wide. However, this interaction between the players might lead to ...
Marcus Martens, Siqi Shen, Alexandru Iosup, Fernan...
—Twitch is a streaming platform that lets users broadcast their screen whilst playing games. People can share their game experience and interact with others in real time. Twitch ...
— Cloud based video games bring new opportunities to the gaming industry, and enable end-users to play high-end graphic games on any low-end device without high performance hardw...
Maryam Amiri, Hussein Al Osman, Shervin Shirmohamm...
—League of Legends is a multiplayer online battle arena game where features are unlocked as players level up their accounts. Because it takes a significant amount of time to rea...
Abstract—Control-Flow Integrity (CFI) is an important security property that needs to be enforced to prevent controlflow hijacking attacks. Recent attacks have demonstrated that...