A Systematic Mapping Study on Cloud Computing Security
Noman Mazher, Imran Ashraf
openalex +1 more source
Cloud computing convergence: integrating computer applications and information management for enhanced efficiency. [PDF]
Zhang G.
europepmc +1 more source
The Conundrum of Security in Modern Cloud Computing
Thomas Sommer+2 more
openalex +2 more sources
Communicating tokenomics and monetary policy: A comparative analysis of real and virtual economies
Abstract This article investigates the economic governance of blockchain‐based virtual economies in the context of monetary policy. Focusing on tokenomics communication, we employ deductive and inductive approaches, applying real‐world monetary policy metrics and text mining frameworks. Our comparative analysis reveals that the tokenomics communication
Kane Falco ter Veer, Timo Heinrich
wiley +1 more source
Enhancing Microservice Security Through Vulnerability-Driven Trust in the Service Mesh Architecture. [PDF]
Alboqmi R, Gamble RF.
europepmc +1 more source
An Optimistic Approach for Intrusion Security in Cloud
Jitendra KumarSeth, Satish Chandra
openalex +1 more source
A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture. [PDF]
Thilakarathne NN+3 more
europepmc +1 more source
Inkjet‐printed reconfigurable and recyclable memristors on paper
In this work, we focus on using sustainable production and additive manufacturing processes to fabricate high‐yield, recyclable, multifunctional, and reconfigurable memristors on paper‐based substrates. Reconfigurable memristors can mimic the functions of neurons and synapses, thereby simplifying the structure of neuromorphic computing systems.
Jinrui Chen+15 more
wiley +1 more source
Editorial: Bench to bedside: AI and remote patient monitoring. [PDF]
Ramezani R+3 more
europepmc +1 more source
A Survey on Security Mechanisms of Leading Cloud Service Providers
Deepak Panth+2 more
openalex +1 more source