Results 281 to 290 of about 46,558 (308)
Some of the next articles are maybe not open access.
Cloud of Secure Elements perspectives for mobile and cloud applications security
2013 IEEE Conference on Communications and Network Security (CNS), 2013This poster illustrates an emerging concept of Cloud of Secure Elements (CoSE) whose goal is to provide trusted computing resources to mobile and cloud applications according to open technologies driven by standards. The poster describes the CoSE platform that comprises mobile or fix terminals, grid of secure elements (GoSE) and administration entities
openaire +2 more sources
2017
Public, private, and hybrid cloud services and infrastructure are shown to be vulnerable to a set of cybersecurity threats. Risk mitigation is best achieved through a variety of cybersecurity measures including cloud access security brokers, encryption, virtual private network peering, and microsegmentation. Trends in cloud security are outlined.
openaire +2 more sources
Public, private, and hybrid cloud services and infrastructure are shown to be vulnerable to a set of cybersecurity threats. Risk mitigation is best achieved through a variety of cybersecurity measures including cloud access security brokers, encryption, virtual private network peering, and microsegmentation. Trends in cloud security are outlined.
openaire +2 more sources
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly
A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G
IEEE Communications Surveys and Tutorials, 2022Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly
Machine Learning in IoT Security: Current Solutions and Future Challenges
IEEE Communications Surveys and Tutorials, 2020Ekram Hossain+2 more
exaly
A Survey on Metaverse: Fundamentals, Security, and Privacy
IEEE Communications Surveys and Tutorials, 2023Yuntao Wang, Zhou Su, Xiaofeng Tao
exaly
Securing the Cloud: Cloud Computer Security Techniques and Tactics
Kybernetes, 2012openaire +4 more sources