Results 41 to 50 of about 487,200 (366)
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya+12 more
core +1 more source
Data security in cloud computing [PDF]
This paper discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The paper will go in to details of data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats.
Albugmi, Ahmed, Nammas+3 more
openaire +2 more sources
Security challenges and solutions using healthcare cloud computing
Cloud computing is among the most beneficial solutions to digital problems. Security is one of the focal issues in cloud computing technology, and this study aims at investigating security issues of cloud computing and their probable solutions.
M. Mehrtak+12 more
semanticscholar +1 more source
Traditional security risk assessment methods in cloud computing environment: usability analysis [PDF]
The term "Cloud Computing" has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used ...
Ahmed, Azuan+4 more
core +2 more sources
Cloud Computing Security Challenges in Higher Educational Institutions - A Survey
Cloud computing brings for higher educational institution a wide range of benefits with new capabilities to incorporate in the educational process. However, the cloud services are vulnerable to a variety of security challenges.
K. Al-Shqeerat+3 more
semanticscholar +1 more source
This study introduces a scalable and colored low‐emissivity (low‐e) paint achieved by spraying an ultrathin n‐doped poly(benzodifurandione) (n‐PBDF) coating onto various colored substrates. The low‐e paint enhances thermal regulation by reducing mid‐infrared thermal emissivity to 0.19, thereby stabilizing indoor temperatures across diverse climates ...
Xiaojie Liu+13 more
wiley +1 more source
With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing ...
Ai-min YANG+3 more
doaj +2 more sources
Security Architecture for Cloud-Based Command and Control System in IoT Environment
With the development of the fourth industrial technology, such as the Internet of Things (IoT) and cloud computing, developed countries including the U.S.
Jahoon Koo+3 more
doaj +1 more source
Security risk factors that influence cloud computing adoption in Saudi Arabia government agencies [PDF]
Cloud computing technologies play a substantial role in public organizations and private sector companies since it reduces the cost of using information technology services and allows users to access the service anytime and everywhere, whilst only paying
Alassafi, Madini, Obad+3 more
core +1 more source
Heterojunctions combining halide perovskites with low‐dimensional materials enhance optoelectronic devices by enabling precise charge control and improving efficiency, stability, and speed. These synergies advance flexible electronics, wearable sensors, and neuromorphic computing, mimicking biological vision for real‐time image analysis and intelligent
Yu‐Jin Du+11 more
wiley +1 more source