Results 11 to 20 of about 464,365 (270)
Background Plant aquaporins are critical genetic players performing multiple biological functions, especially climate resilience and water-use efficiency. Their genomic diversity across genus Oryza is yet to be explored. Results This study identified 369
Qasim Raza +7 more
doaj +1 more source
SECURING DATA AND APPLICATIONS IN CLOUD. CASE STUDY [PDF]
Security is a principal concern when entrusting an organization’s critical information to geographically dispersed cloud platforms. In addition to the conventional IT system security procedures, designing security into cloud during the software ...
Otilia Cangea
doaj +1 more source
CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha +16 more
core +3 more sources
Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking [PDF]
Cloud data provenance, or "what has happened to my data in the cloud", is a critical data security component which addresses pressing data accountability and data governance issues in cloud computing systems. In this paper, we present Progger (Provenance
Ko, Ryan K.L., Will, Mark Antony
core +2 more sources
On Secrecy Analysis of DF Based Dual Hop Mixed RF-FSO Systems
In this paper, the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) communication system that consists of a source (S), a relay (R), a destination (D), and an eavesdropper (E), is studied.
Xiaojun Pan +4 more
doaj +1 more source
Security and Privacy in Cloud Computing: Technical Review
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of ...
Yunusa Simpa Abdulsalam +1 more
doaj +1 more source
Secure Cloud-Edge Deployments, with Trust [PDF]
Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for
Brogi, Antonio +2 more
core +2 more sources
An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions
The rapidly growing use of cloud computing raises security concerns. This study paper seeks to examine cloud security frameworks, addressing cloud-associated issues and suggesting solutions.
Milan Chauhan, Stavros Shiaeles
doaj +1 more source
Introduction: Lung cancer is currently among the most prevalent and lethal cancers in the world in terms of incidence and fatality rates. In clinical practice, identifying the specific subtypes of lung cancer is essential in diagnosing and treating lung ...
Zhaoliang Zheng +19 more
doaj +1 more source
Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime +4 more
doaj +1 more source

