Results 11 to 20 of about 51,827 (294)

Genomic diversity of aquaporins across genus Oryza provides a rich genetic resource for development of climate resilient rice cultivars

open access: yesBMC Plant Biology, 2023
Background Plant aquaporins are critical genetic players performing multiple biological functions, especially climate resilience and water-use efficiency. Their genomic diversity across genus Oryza is yet to be explored. Results This study identified 369
Qasim Raza   +7 more
doaj   +1 more source

SECURING DATA AND APPLICATIONS IN CLOUD. CASE STUDY [PDF]

open access: yesRomanian Journal of Petroleum & Gas Technology, 2023
Security is a principal concern when entrusting an organization’s critical information to geographically dispersed cloud platforms. In addition to the conventional IT system security procedures, designing security into cloud during the software ...
Otilia Cangea
doaj   +1 more source

On Secrecy Analysis of DF Based Dual Hop Mixed RF-FSO Systems

open access: yesIEEE Access, 2019
In this paper, the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) communication system that consists of a source (S), a relay (R), a destination (D), and an eavesdropper (E), is studied.
Xiaojun Pan   +4 more
doaj   +1 more source

Security and Privacy in Cloud Computing: Technical Review

open access: yesFuture Internet, 2021
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of ...
Yunusa Simpa Abdulsalam   +1 more
doaj   +1 more source

An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions

open access: yesNetwork, 2023
The rapidly growing use of cloud computing raises security concerns. This study paper seeks to examine cloud security frameworks, addressing cloud-associated issues and suggesting solutions.
Milan Chauhan, Stavros Shiaeles
doaj   +1 more source

KD_ConvNeXt: knowledge distillation-based image classification of lung tumor surgical specimen sections

open access: yesFrontiers in Genetics, 2023
Introduction: Lung cancer is currently among the most prevalent and lethal cancers in the world in terms of incidence and fatality rates. In clinical practice, identifying the specific subtypes of lung cancer is essential in diagnosing and treating lung ...
Zhaoliang Zheng   +19 more
doaj   +1 more source

Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach

open access: yesApplied Sciences, 2023
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime   +4 more
doaj   +1 more source

CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure

open access: yesIEEE Access, 2020
Most cyber-attacks and data breaches in cloud infrastructure are due to human errors and misconfiguration vulnerabilities. Cloud customer-centric tools are imperative for mitigating these issues, however existing cloud security models are largely unable ...
Kennedy A. Torkura   +3 more
doaj   +1 more source

Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture

open access: yesIEEE Access
In the rapidly evolving realm of the Industrial Internet of Things (IIoT), securing shop floor operations, especially in audit processes, is of critical importance.
Fatemeh Stodt   +4 more
doaj   +1 more source

Practice on edge cloud security of telecom operators

open access: yesDianxin kexue, 2023
Abstact: In the peak period of operator edge cloud construction, in order to realize the “three synchronization” construction strategy, the network edge cloud construction and operation and maintenance management mode were expounded, the security risks ...
Le ZHANG, Hongyuan MA
doaj   +2 more sources

Home - About - Disclaimer - Privacy