Results 261 to 270 of about 514,554 (290)
Some of the next articles are maybe not open access.

Efficient and exact duplicate detection on cloud

Concurrency and Computation: Practice and Experience, 2012
SUMMARYAs the recent proliferation of social networks, mobile applications, and online services increased the rate of data gathering, to find near‐duplicate records efficiently has become a challenging issue. Related works on this problem mainly aim to propose efficient approaches on a single machine.
Chuitian Rong   +3 more
openaire   +1 more source

Detecting fraudulent use of cloud resources

Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 2011
Initial threat modeling and security research on the public cloud model has primarily focused on the confidentiality and integrity of data transferred, processed, and stored in the cloud. Little attention has been paid to the external threat sources that have the capability to affect the financial viability, hence the long-term availability, of ...
Joseph Idziorek   +2 more
openaire   +1 more source

Version Detection for Software Discovery in the Cloud

Proceedings of the 21st International Middleware Conference Demos and Posters, 2020
With the growth in server traffic and component diversity in cloud systems, administrators face the increasingly onerous task of monitoring system activity. Failure to keep track of the contents of virtual servers can limit overall efficiency and create security risks for users.
Sadie L. Allen   +2 more
openaire   +1 more source

Intrusion Detection for Grid and Cloud Computing

IT Professional, 2010
Providing security in a distributed system requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. The Grid and Cloud Computing Intrusion Detection System integrates knowledge and behavior analysis to detect intrusions.
Kleber Vieira   +3 more
openaire   +1 more source

Early Detection of Fraud Storms in the Cloud

2015
Cloud computing resources are sometimes hijacked for fraudulent use. While some fraudulent use manifests as a small-scale resource consumption, a more serious type of fraud is that of fraud storms, which are events of large-scale fraudulent use. These events begin when fraudulent users discover new vulnerabilities in the sign up process, which they ...
Hani Neuvirth   +5 more
openaire   +1 more source

Channel Attention Cloud Detection Network forĀ Ground-Based Cloud Detection

2023
Jiafeng Zhang   +4 more
openaire   +1 more source

Cloud and cloud shadow detection for optical satellite imagery: Features, algorithms, validation, and prospects

ISPRS Journal of Photogrammetry and Remote Sensing, 2022
Zhiwei Li, Huanfeng Shen, Qihao Weng
exaly  

Multi-temporal cloud detection based on robust PCA for optical remote sensing imagery

Computers and Electronics in Agriculture, 2021
Hongyan Zhang   +2 more
exaly  

CDnetV2: CNN-Based Cloud Detection for Remote Sensing Imagery With Cloud-Snow Coexistence

IEEE Transactions on Geoscience and Remote Sensing, 2021
Jianhua Guo   +2 more
exaly  

Home - About - Disclaimer - Privacy