Results 1 to 10 of about 429,644 (328)
A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats [PDF]
Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and trust-centric
Tuba Arif, Byunghyun Jo, Jong Hyuk Park
doaj +2 more sources
Automated and Secure Onboarding for System of Systems
The Internet of Things (IoT) is rapidly changing the number of connected devices and the way they interact with each other. This increases the need for an automated and secure onboarding procedure for IoT devices, systems and services.
Silia Maksuti+8 more
doaj +1 more source
Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future.
Fatemeh Stodt+2 more
doaj +1 more source
Edge storage, as a supplement to cloud storage, reduces latency by providing services in a timely and efficient manner near the source. In a collaborative edge storage datacenter network (CESN), not only does the edge storage datacenter (ESDC) that is ...
Wenlong Ke+3 more
doaj +1 more source
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare.
Fatemeh Stodt, Christoph Reich
doaj +1 more source
Demystifying MLOps and Presenting a Recipe for the Selection of Open-Source Tools
Nowadays, machine learning projects have become more and more relevant to various real-world use cases. The success of complex Neural Network models depends upon many factors, as the requirement for structured and machine learning-centric project ...
Philipp Ruf+3 more
doaj +1 more source
SECURING DATA AND APPLICATIONS IN CLOUD. CASE STUDY [PDF]
Security is a principal concern when entrusting an organization’s critical information to geographically dispersed cloud platforms. In addition to the conventional IT system security procedures, designing security into cloud during the software ...
Otilia Cangea
doaj +1 more source
Secrecy Analysis for Multi-Relaying RF-FSO Systems With a Multi-Aperture Destination
In this paper, we investigate the physical layer security for an asymmetric dual-hop radio frequency-free space optical (RF-FSO) communication system, in which a source transmits information to a multi-aperture destination (D) through a best relay under ...
Jiliang Zhang+3 more
doaj +1 more source
Cloud Computing and Security Issues in the Cloud [PDF]
Cloud computing has formed the conceptual and infrastructural basis for tomorrow s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing ...
Monjur Ahmed, Mohammad Ashraf Hossain
openaire +2 more sources
Background Plant aquaporins are critical genetic players performing multiple biological functions, especially climate resilience and water-use efficiency. Their genomic diversity across genus Oryza is yet to be explored. Results This study identified 369
Qasim Raza+7 more
doaj +1 more source