Results 261 to 270 of about 514,554 (290)
Some of the next articles are maybe not open access.
Efficient and exact duplicate detection on cloud
Concurrency and Computation: Practice and Experience, 2012SUMMARYAs the recent proliferation of social networks, mobile applications, and online services increased the rate of data gathering, to find nearāduplicate records efficiently has become a challenging issue. Related works on this problem mainly aim to propose efficient approaches on a single machine.
Chuitian Rong +3 more
openaire +1 more source
Detecting fraudulent use of cloud resources
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 2011Initial threat modeling and security research on the public cloud model has primarily focused on the confidentiality and integrity of data transferred, processed, and stored in the cloud. Little attention has been paid to the external threat sources that have the capability to affect the financial viability, hence the long-term availability, of ...
Joseph Idziorek +2 more
openaire +1 more source
Version Detection for Software Discovery in the Cloud
Proceedings of the 21st International Middleware Conference Demos and Posters, 2020With the growth in server traffic and component diversity in cloud systems, administrators face the increasingly onerous task of monitoring system activity. Failure to keep track of the contents of virtual servers can limit overall efficiency and create security risks for users.
Sadie L. Allen +2 more
openaire +1 more source
Intrusion Detection for Grid and Cloud Computing
IT Professional, 2010Providing security in a distributed system requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. The Grid and Cloud Computing Intrusion Detection System integrates knowledge and behavior analysis to detect intrusions.
Kleber Vieira +3 more
openaire +1 more source
Early Detection of Fraud Storms in the Cloud
2015Cloud computing resources are sometimes hijacked for fraudulent use. While some fraudulent use manifests as a small-scale resource consumption, a more serious type of fraud is that of fraud storms, which are events of large-scale fraudulent use. These events begin when fraudulent users discover new vulnerabilities in the sign up process, which they ...
Hani Neuvirth +5 more
openaire +1 more source
Channel Attention Cloud Detection Network forĀ Ground-Based Cloud Detection
2023Jiafeng Zhang +4 more
openaire +1 more source
Multi-temporal cloud detection based on robust PCA for optical remote sensing imagery
Computers and Electronics in Agriculture, 2021Hongyan Zhang +2 more
exaly
CDnetV2: CNN-Based Cloud Detection for Remote Sensing Imagery With Cloud-Snow Coexistence
IEEE Transactions on Geoscience and Remote Sensing, 2021Jianhua Guo +2 more
exaly

