Results 101 to 110 of about 2,486,163 (328)

Efficient Dynamic Bloom Filter Hashing Fragmentation for Cloud Data Storage

open access: yesCybernetics and Information Technologies, 2019
Security is important in cloud data storage while using the cloud services provided by the service provider in the cloud. Most of the research works have been designed for a secure cloud data storage.
Jegadeeswari S.   +2 more
doaj   +1 more source

Multilevel classification of security concerns in cloud computing

open access: yesApplied Computing and Informatics, 2017
Threats jeopardize some basic security requirements in a cloud. These threats generally constitute privacy breach, data leakage and unauthorized data access at different cloud layers.
Syed Asad Hussain   +4 more
doaj   +1 more source

Is Cloud Computing Steganography-proof? [PDF]

open access: yesarXiv, 2011
The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security we move to brief description of steganography. In particular we introduce classification of steganographic communication scenarios in cloud computing which is based on location of the steganograms ...
arxiv  

Ensuring data storage security in Cloud Computing [PDF]

open access: green, 2009
Cong Wang   +3 more
openalex   +1 more source

AInsectID Version 1.1: An Insect Species Identification Software Based on the Transfer Learning of Deep Convolutional Neural Networks

open access: yesAdvanced Intelligent Discovery, EarlyView.
This paper describes the basis for AInsectID Version 1, a GUI‐operable open‐source insect species identification, color processing, and image analysis software. This paper discusses our methods of algorithmic development, coupled to rigorous machine training used to enable high levels of validation accuracy.
Haleema Sadia, Parvez Alam
wiley   +1 more source

Problems of Designing Complex Information Security System for Cloud Resources in the Republic of Belarus

open access: yesЦифровая трансформация, 2021
The influence of cloud computing on the information security of information resources during their transfer or deployment on cloud platforms is considered. The relevance of the problem of protecting information resources on cloud platforms, including for
V. P. Kochyn, A. V. Shantsou
doaj   +2 more sources

A Security Perspective on Adoption and Migration to Mobile Cloud Technology

open access: yesJOIV: International Journal on Informatics Visualization, 2017
Security is one of the main concerns of those who want to adopt and migrate to cloud computing technology. Security issues raised by cloud technology reveals that mobile cloud computing is raising the privacy and security issues such as identification ...
Mohammad Bin Ghudayyer   +2 more
doaj   +1 more source

Data Migration among Different Clouds [PDF]

open access: yesarXiv, 2015
Cloud computing services are becoming more and more popular. However, the high concentration of data and services on the clouds make them attractive targets for various security attacks, including DoS, data theft, and privacy attacks. Additionally, cloud providers may fail to comply with service level agreement in terms of performance, availability ...
arxiv  

Widened Attention‐Enhanced Atrous Convolutional Network for Efficient Embedded Vision Applications under Resource Constraints

open access: yesAdvanced Intelligent Systems, EarlyView.
The article introduces WACEfNet, a new convolutional neural network architecture optimized for efficient aerial image analysis under resource constraints. It creatively integrates attention mechanisms and atrous convolutions into a compact widened residual network framework.
Md Meftahul Ferdaus   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy