Results 211 to 220 of about 755,631 (334)
A Flow Sensitive Security Model for Cloud Computing Systems
Wen Zeng+3 more
openalex +2 more sources
This study reviews the research findings on the shear behavior of bolted rock joints in deep underground engineering, where they face high stress, high water pressure, and engineering disturbance. This study examines how the shear strength of bolted rock joints is affected by various factors, such as normal stress, rock compressive strength, joint ...
Chang Zhou+5 more
wiley +1 more source
Reinforcement learning based Secure edge enabled multi task scheduling model for internet of everything applications. [PDF]
Kesavan V T, R V, Wong WK, Ng PK.
europepmc +1 more source
Study on Cloud Computing Security
Min Zhang+3 more
openaire +2 more sources
Leakage risk assessment system for salt cavern hydrogen storage
Establishment of a leakage risk evaluation system for salt cavern hydrogen storage reservoirs using the entropy weight method plus two‐dimensional cloud modeling approach. Abstract Salt cavern hydrogen storage (SCHS) is an important component of large‐scale underground hydrogen storage, with advantages such as large hydrogen storage capacity and ...
Weizheng Bai+4 more
wiley +1 more source
Cloud computing convergence: integrating computer applications and information management for enhanced efficiency. [PDF]
Zhang G.
europepmc +1 more source
A REVIEW TO ASSESS OPPORTUNITIES AND SECURITY RISK CHALLENGES IN CLOUD COMPUTING
Shikha Gupta
openalex +1 more source
Enhanced novelty approaches for resource allocation model for multi-cloud environment in vehicular Ad-Hoc networks. [PDF]
Isaac RA+3 more
europepmc +1 more source
The Influence of Information Security on the Adoption of Cloud Computing: An Exploratory Analysis
Omondi John Opala+2 more
openalex +1 more source