Results 11 to 20 of about 2,849,694 (325)

Recommendations and Best Practices for Cloud Enterprise Security [PDF]

open access: green, 2014
© 2014 IEEE. Enterprise security is essential to achieve global information security in business and organizations. Enterprise Cloud computing is a new paradigm for that enterprise where businesses need to be secured.
Muthu Ramachandran, Victor Chang
openalex   +3 more sources

Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication

open access: yesApplied Sciences, 2023
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud security from unauthorized access and data breaches. Multi-factor authentication verifies that authentic cloud users are only authorized to access cloud apps ...
A. M. Mostafa   +6 more
semanticscholar   +1 more source

Cyber resilience and cyber security issues of intelligent cloud computing systems

open access: yesResults in Control and Optimization, 2023
It is necessary to provide the cyber security of cloud computing according to the components that constitute its structure. The first step in advancing the cyber security of this technology is to accurately identify its threats.
Fargana Abdullayeva
doaj   +1 more source

Security Audit of a Blockchain-Based Industrial Application Platform

open access: yesAlgorithms, 2021
In recent years, both the Internet of Things (IoT) and blockchain technologies have been highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the Fourth Industrial Revolution, which benefits from communication and ...
Jan Stodt   +5 more
doaj   +1 more source

Genomic diversity of aquaporins across genus Oryza provides a rich genetic resource for development of climate resilient rice cultivars

open access: yesBMC Plant Biology, 2023
Background Plant aquaporins are critical genetic players performing multiple biological functions, especially climate resilience and water-use efficiency. Their genomic diversity across genus Oryza is yet to be explored. Results This study identified 369
Qasim Raza   +7 more
doaj   +1 more source

Machine Learning for Cloud Security: A Systematic Review

open access: yesIEEE Access, 2021
The popularity and usage of Cloud computing is increasing rapidly. Several companies are investing in this field either for their own use or to provide it as a service for others.
Ali Bou Nassif   +4 more
semanticscholar   +1 more source

Secrecy Analysis for Multi-Relaying RF-FSO Systems With a Multi-Aperture Destination

open access: yesIEEE Photonics Journal, 2020
In this paper, we investigate the physical layer security for an asymmetric dual-hop radio frequency-free space optical (RF-FSO) communication system, in which a source transmits information to a multi-aperture destination (D) through a best relay under ...
Jiliang Zhang   +3 more
doaj   +1 more source

SECURING DATA AND APPLICATIONS IN CLOUD. CASE STUDY [PDF]

open access: yesRomanian Journal of Petroleum & Gas Technology, 2023
Security is a principal concern when entrusting an organization’s critical information to geographically dispersed cloud platforms. In addition to the conventional IT system security procedures, designing security into cloud during the software ...
Otilia Cangea
doaj   +1 more source

Cloud Computing and Security Issues in the Cloud [PDF]

open access: yesInternational Journal of Network Security & Its Applications, 2014
Cloud computing has formed the conceptual and infrastructural basis for tomorrow s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing ...
Monjur Ahmed, Mohammad Ashraf Hossain
openaire   +1 more source

OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure

open access: yesJournal of Cloud Computing, 2023
Network Intrusion Detection Systems (NIDS) and firewalls are the de facto solutions in the modern cloud to detect cyberattacks and minimize potential hazards for tenant networks. Most of the existing firewalls, perimeter security, and middlebox solutions
P. Krishnan   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy