Results 21 to 30 of about 2,486,163 (328)

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

open access: yesIEEE Access, 2021
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi   +5 more
semanticscholar   +1 more source

On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
In this paper, we evaluate the secrecy performance in terms of secrecy outage probability (SOP) for Internet of things (IoT) enabled multi-relaying non-orthogonal multiple access (NOMA) networks with energy harvesting over Nakagami-m fading channels ...
Mengdie Han, Jiliang Zhang
doaj  

CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure

open access: yesIEEE Access, 2020
Most cyber-attacks and data breaches in cloud infrastructure are due to human errors and misconfiguration vulnerabilities. Cloud customer-centric tools are imperative for mitigating these issues, however existing cloud security models are largely unable ...
Kennedy A. Torkura   +3 more
doaj   +1 more source

KD_ConvNeXt: knowledge distillation-based image classification of lung tumor surgical specimen sections

open access: yesFrontiers in Genetics, 2023
Introduction: Lung cancer is currently among the most prevalent and lethal cancers in the world in terms of incidence and fatality rates. In clinical practice, identifying the specific subtypes of lung cancer is essential in diagnosing and treating lung ...
Zhaoliang Zheng   +19 more
doaj   +1 more source

An insider user authentication method based on improved temporal convolutional network

open access: yesHigh-Confidence Computing, 2023
With the rapid development of information technology, information system security and insider threat detection have become important topics for organizational management.
Xiaoling Tao   +4 more
doaj  

AI-Driven Cloud Security: The Future of Safeguarding Sensitive Data in the Digital Age

open access: yesJournal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023
As organizations increasingly rely on cloud computing for storage, processing, and deployment of sensitive data, ensuring robust security measures becomes paramount. This paper explores the intersection of artificial intelligence (AI) and cloud security,
Hassan Rehan
semanticscholar   +1 more source

Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach

open access: yesApplied Sciences, 2023
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime   +4 more
doaj   +1 more source

Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey

open access: yesElectronics, 2021
Cloud computing provides the flexible architecture where data and resources are dispersed at various locations and are accessible from various industrial environments. Cloud computing has changed the using, storing, and sharing of resources such as data,
Waqas Ahmad   +4 more
semanticscholar   +1 more source

A Security-Driven Approach for Energy-Aware Cloud Resource Pricing and Allocation

open access: yesAdvances in Electrical and Computer Engineering, 2021
Auctions are often recommended as effective cloud resource pricing and allocation mechanism. If adequately set, auctions provide incentives for cloud users’ truthful bidding and support cloud provider’s revenue maximization.
MIKAVICA, B., KOSTIC-LJUBISAVLJEVIC, A.
doaj   +1 more source

Data Security and Privacy in Cloud Computing: Concepts and Emerging Trends [PDF]

open access: yesarXiv, 2021
Millions of users across the world leverages data processing and sharing benefits from cloud environment. Data security and privacy are inevitable requirement of cloud environment. Massive usage and sharing of data among users opens door to security loopholes.
arxiv  

Home - About - Disclaimer - Privacy