A GAN-Based Approach for enhancing security in satellite based IoT networks using MPI enabled HPC. [PDF]
Ahmad SZ+6 more
europepmc +1 more source
The Conundrum of Security in Modern Cloud Computing
Thomas Sommer+2 more
openalex +2 more sources
Essential work, invisible workers: The role of digital curation in COVID‐19 Open Science
Abstract In this paper, we examine the role digital curation practices and practitioners played in facilitating open science (OS) initiatives amid the COVID‐19 pandemic. In Summer 2023, we conducted a content analysis of available information regarding 50 OS initiatives that emerged—or substantially shifted their focus—between 2020 and 2022 to address ...
Irene V. Pasquetto+2 more
wiley +1 more source
Enhancing cloud security and deduplication efficiency with SALIGP and cryptographic authentication. [PDF]
Periasamy JK+3 more
europepmc +1 more source
A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing
N. Hemalatha+3 more
openalex +1 more source
Research on the Optimal Design of Computing Security based on Cloud Computing [PDF]
Fan Yang, Yutai Rao
openalex +1 more source
Abstract Provenance is the story of how something has come to be. In this paper, we provide a systematic literature review to categorize the various notions of provenance in Information Sciences. The goal of this review is to paint a broader picture of the multiple uses of provenance at play and to enhance our understanding of the importance of ...
Rhiannon Bettivia+2 more
wiley +1 more source
Enhanced secure storage and data privacy management system for big data based on multilayer model. [PDF]
Ting T, Li M.
europepmc +1 more source
Study on Mobile Large Data Storage Security in Cloud Computing Environment [PDF]
Xianwei Li
openalex +1 more source
Monocular visual servo control of a quadcopter for crossing windows, doors, and corridors
Abstract This paper proposes a sequential visual servo control scheme for quadcopters, where the main goal is to drive a quadcopter to a desired pose while crossing windows, doors, or corridors using only visual feedback. This control scheme is composed of two stages that act in sequence: the approaching and pose regulation phases.
Carlos A. Toro‐Arcila+2 more
wiley +1 more source