Results 1 to 10 of about 2,849,694 (325)

An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions

open access: yesNetwork, 2023
The rapidly growing use of cloud computing raises security concerns. This study paper seeks to examine cloud security frameworks, addressing cloud-associated issues and suggesting solutions.
Milan Chauhan, Stavros Shiaeles
doaj   +2 more sources

Security and Privacy in Cloud Computing: Technical Review

open access: yesFuture Internet, 2021
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of ...
Yunusa Simpa Abdulsalam   +1 more
doaj   +2 more sources

Automated and Secure Onboarding for System of Systems

open access: yesIEEE Access, 2021
The Internet of Things (IoT) is rapidly changing the number of connected devices and the way they interact with each other. This increases the need for an automated and secure onboarding procedure for IoT devices, systems and services.
Silia Maksuti   +8 more
doaj   +1 more source

Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing

open access: yesApplied Sciences, 2023
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future.
Fatemeh Stodt   +2 more
doaj   +1 more source

A Priority-Based Multicast Flow Scheduling Method for a Collaborative Edge Storage Datacenter Network

open access: yesIEEE Access, 2021
Edge storage, as a supplement to cloud storage, reduces latency by providing services in a timely and efficient manner near the source. In a collaborative edge storage datacenter network (CESN), not only does the edge storage datacenter (ESDC) that is ...
Wenlong Ke   +3 more
doaj   +1 more source

Introducing a Fair Tax Method to Harden Industrial Blockchain Applications against Network Attacks: A Game Theory Approach

open access: yesComputers, 2023
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare.
Fatemeh Stodt, Christoph Reich
doaj   +1 more source

Cloud Security and Privacy

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2023
: Over the last decade, cloud computing has grown and evolved significantly. It provides cost-effective solutions as well as a wide range of adaptable services. Many businesses are using cloud services.
Aayush Bhansali
semanticscholar   +1 more source

Demystifying MLOps and Presenting a Recipe for the Selection of Open-Source Tools

open access: yesApplied Sciences, 2021
Nowadays, machine learning projects have become more and more relevant to various real-world use cases. The success of complex Neural Network models depends upon many factors, as the requirement for structured and machine learning-centric project ...
Philipp Ruf   +3 more
doaj   +1 more source

On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
In this paper, we evaluate the secrecy performance in terms of secrecy outage probability (SOP) for Internet of things (IoT) enabled multi-relaying non-orthogonal multiple access (NOMA) networks with energy harvesting over Nakagami-m fading channels ...
Mengdie Han, Jiliang Zhang
doaj   +1 more source

An insider user authentication method based on improved temporal convolutional network

open access: yesHigh-Confidence Computing, 2023
With the rapid development of information technology, information system security and insider threat detection have become important topics for organizational management.
Xiaoling Tao   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy