Results 1 to 10 of about 2,849,694 (325)
An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions
The rapidly growing use of cloud computing raises security concerns. This study paper seeks to examine cloud security frameworks, addressing cloud-associated issues and suggesting solutions.
Milan Chauhan, Stavros Shiaeles
doaj +2 more sources
Security and Privacy in Cloud Computing: Technical Review
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of ...
Yunusa Simpa Abdulsalam+1 more
doaj +2 more sources
Automated and Secure Onboarding for System of Systems
The Internet of Things (IoT) is rapidly changing the number of connected devices and the way they interact with each other. This increases the need for an automated and secure onboarding procedure for IoT devices, systems and services.
Silia Maksuti+8 more
doaj +1 more source
Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future.
Fatemeh Stodt+2 more
doaj +1 more source
Edge storage, as a supplement to cloud storage, reduces latency by providing services in a timely and efficient manner near the source. In a collaborative edge storage datacenter network (CESN), not only does the edge storage datacenter (ESDC) that is ...
Wenlong Ke+3 more
doaj +1 more source
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare.
Fatemeh Stodt, Christoph Reich
doaj +1 more source
: Over the last decade, cloud computing has grown and evolved significantly. It provides cost-effective solutions as well as a wide range of adaptable services. Many businesses are using cloud services.
Aayush Bhansali
semanticscholar +1 more source
Demystifying MLOps and Presenting a Recipe for the Selection of Open-Source Tools
Nowadays, machine learning projects have become more and more relevant to various real-world use cases. The success of complex Neural Network models depends upon many factors, as the requirement for structured and machine learning-centric project ...
Philipp Ruf+3 more
doaj +1 more source
On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems
In this paper, we evaluate the secrecy performance in terms of secrecy outage probability (SOP) for Internet of things (IoT) enabled multi-relaying non-orthogonal multiple access (NOMA) networks with energy harvesting over Nakagami-m fading channels ...
Mengdie Han, Jiliang Zhang
doaj +1 more source
An insider user authentication method based on improved temporal convolutional network
With the rapid development of information technology, information system security and insider threat detection have become important topics for organizational management.
Xiaoling Tao+4 more
doaj +1 more source