Conceptual Modelling of Complex Network Management Systems

This work was performed as part of the Smart University Project financed by the University of Alicante.

[1]  Nicola Guarino,et al.  Business Process Management , 2016, Business & Information Systems Engineering.

[2]  Mokdong Chung,et al.  Adaptive security management model in the cloud computing environment , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[3]  Martin Gogolla Unified Modeling Language , 2009, Encyclopedia of Database Systems.

[4]  Haifeng Chen,et al.  Discovering likely invariants of distributed transaction systems for autonomic system management , 2006, 2006 IEEE International Conference on Autonomic Computing.

[5]  Mariacristina Roscia,et al.  Smart City by multi-agent systems , 2013, 2013 International Conference on Renewable Energy Research and Applications (ICRERA).

[6]  Evangelos P. Markatos,et al.  Emulation-Based Detection of Non-self-contained Polymorphic Shellcode , 2007, RAID.

[7]  Hervé Debar,et al.  Intrusion Detection: Introduction to Intrusion Detection and Security Information Management , 2005, FOSAD.

[8]  Robert K. Cunningham,et al.  Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.

[9]  Howard Smith,et al.  Business Process Management: The Third Wave , 2003 .

[10]  Ivar Jacobson,et al.  The Unified Modeling Language User Guide , 1998, J. Database Manag..

[11]  Kevin Curran,et al.  Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..

[12]  E. Ronco,et al.  The enhanced Telecom Operations Map™ (eTOM) Business Process Framework , 2002 .

[13]  Shafiullah Khan,et al.  Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.

[14]  Yuan Ge,et al.  Efficient Invariant Search for Distributed Information Systems , 2013, 2013 IEEE 13th International Conference on Data Mining.

[15]  Christopher Krügel,et al.  Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.

[16]  Peter Fettke,et al.  Business Process Modeling Notation , 2008, Wirtschaftsinf..

[17]  Diego Marcos-Jorquera,et al.  A New Paradigm: Cloud Agile Manufacturing , 2012 .

[18]  Christopher Krügel,et al.  Intrusion Detection and Correlation - Challenges and Solutions , 2004, Advances in Information Security.

[19]  Ivar Jacobson,et al.  The unified modeling language reference manual , 2010 .

[20]  Francisco Maciá Pérez,et al.  Network Intrusion Detection System Embedded on a Smart Sensor , 2011, IEEE Transactions on Industrial Electronics.

[21]  Marta Indulska,et al.  Business Process Modeling- A Comparative Analysis , 2009, J. Assoc. Inf. Syst..

[22]  Zhenkai Liang,et al.  Automatic generation of buffer overflow attack signatures: an approach based on program behavior models , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[23]  John Jeston,et al.  Business Process Management: Practical Guidelines to Successful Implementations , 2006 .

[24]  Cheng Wang,et al.  Android-based Vehicular Distributed Intelligent Video Collection System , 2014, J. Networks.

[25]  Guofei Jiang,et al.  Extracting Overlay Invariants of Distributed Systems for Autonomic System Management , 2010, 2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems.

[26]  Forum TeleManagement,et al.  Enhanced Telecom Operations Map (eTOM) The Business Process Framework Addendum T : eTOM to M. 3400 Mapping Application Note , 2004 .

[27]  Francisco Maciá Pérez,et al.  Energy Management System as an Embedded Service: Saving Energy Consumption of ICT , 2009, ARCS.

[28]  Manfred Reichert,et al.  Modeling Business Objectives for Business Process Management , 2012, S-BPM ONE.

[29]  Anup K. Ghosh,et al.  A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.

[30]  Mark Ryan,et al.  Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..