Results 11 to 20 of about 464,365 (270)

Genomic diversity of aquaporins across genus Oryza provides a rich genetic resource for development of climate resilient rice cultivars

open access: yesBMC Plant Biology, 2023
Background Plant aquaporins are critical genetic players performing multiple biological functions, especially climate resilience and water-use efficiency. Their genomic diversity across genus Oryza is yet to be explored. Results This study identified 369
Qasim Raza   +7 more
doaj   +1 more source

SECURING DATA AND APPLICATIONS IN CLOUD. CASE STUDY [PDF]

open access: yesRomanian Journal of Petroleum & Gas Technology, 2023
Security is a principal concern when entrusting an organization’s critical information to geographically dispersed cloud platforms. In addition to the conventional IT system security procedures, designing security into cloud during the software ...
Otilia Cangea
doaj   +1 more source

CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]

open access: yes, 2012
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha   +16 more
core   +3 more sources

Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking [PDF]

open access: yes, 2014
Cloud data provenance, or "what has happened to my data in the cloud", is a critical data security component which addresses pressing data accountability and data governance issues in cloud computing systems. In this paper, we present Progger (Provenance
Ko, Ryan K.L., Will, Mark Antony
core   +2 more sources

On Secrecy Analysis of DF Based Dual Hop Mixed RF-FSO Systems

open access: yesIEEE Access, 2019
In this paper, the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) communication system that consists of a source (S), a relay (R), a destination (D), and an eavesdropper (E), is studied.
Xiaojun Pan   +4 more
doaj   +1 more source

Security and Privacy in Cloud Computing: Technical Review

open access: yesFuture Internet, 2021
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of ...
Yunusa Simpa Abdulsalam   +1 more
doaj   +1 more source

Secure Cloud-Edge Deployments, with Trust [PDF]

open access: yes, 2019
Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for
Brogi, Antonio   +2 more
core   +2 more sources

An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions

open access: yesNetwork, 2023
The rapidly growing use of cloud computing raises security concerns. This study paper seeks to examine cloud security frameworks, addressing cloud-associated issues and suggesting solutions.
Milan Chauhan, Stavros Shiaeles
doaj   +1 more source

KD_ConvNeXt: knowledge distillation-based image classification of lung tumor surgical specimen sections

open access: yesFrontiers in Genetics, 2023
Introduction: Lung cancer is currently among the most prevalent and lethal cancers in the world in terms of incidence and fatality rates. In clinical practice, identifying the specific subtypes of lung cancer is essential in diagnosing and treating lung ...
Zhaoliang Zheng   +19 more
doaj   +1 more source

Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach

open access: yesApplied Sciences, 2023
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy