Results 11 to 20 of about 2,849,694 (325)
Recommendations and Best Practices for Cloud Enterprise Security [PDF]
© 2014 IEEE. Enterprise security is essential to achieve global information security in business and organizations. Enterprise Cloud computing is a new paradigm for that enterprise where businesses need to be secured.
Muthu Ramachandran, Victor Chang
openalex +3 more sources
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud security from unauthorized access and data breaches. Multi-factor authentication verifies that authentic cloud users are only authorized to access cloud apps ...
A. M. Mostafa+6 more
semanticscholar +1 more source
Cyber resilience and cyber security issues of intelligent cloud computing systems
It is necessary to provide the cyber security of cloud computing according to the components that constitute its structure. The first step in advancing the cyber security of this technology is to accurately identify its threats.
Fargana Abdullayeva
doaj +1 more source
Security Audit of a Blockchain-Based Industrial Application Platform
In recent years, both the Internet of Things (IoT) and blockchain technologies have been highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the Fourth Industrial Revolution, which benefits from communication and ...
Jan Stodt+5 more
doaj +1 more source
Background Plant aquaporins are critical genetic players performing multiple biological functions, especially climate resilience and water-use efficiency. Their genomic diversity across genus Oryza is yet to be explored. Results This study identified 369
Qasim Raza+7 more
doaj +1 more source
Machine Learning for Cloud Security: A Systematic Review
The popularity and usage of Cloud computing is increasing rapidly. Several companies are investing in this field either for their own use or to provide it as a service for others.
Ali Bou Nassif+4 more
semanticscholar +1 more source
Secrecy Analysis for Multi-Relaying RF-FSO Systems With a Multi-Aperture Destination
In this paper, we investigate the physical layer security for an asymmetric dual-hop radio frequency-free space optical (RF-FSO) communication system, in which a source transmits information to a multi-aperture destination (D) through a best relay under ...
Jiliang Zhang+3 more
doaj +1 more source
SECURING DATA AND APPLICATIONS IN CLOUD. CASE STUDY [PDF]
Security is a principal concern when entrusting an organization’s critical information to geographically dispersed cloud platforms. In addition to the conventional IT system security procedures, designing security into cloud during the software ...
Otilia Cangea
doaj +1 more source
Cloud Computing and Security Issues in the Cloud [PDF]
Cloud computing has formed the conceptual and infrastructural basis for tomorrow s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing ...
Monjur Ahmed, Mohammad Ashraf Hossain
openaire +1 more source
OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure
Network Intrusion Detection Systems (NIDS) and firewalls are the de facto solutions in the modern cloud to detect cyberattacks and minimize potential hazards for tenant networks. Most of the existing firewalls, perimeter security, and middlebox solutions
P. Krishnan+4 more
semanticscholar +1 more source