Results 31 to 40 of about 2,486,163 (328)
The current period of medicine using digital technology for patient care presents a new level of integration of monitoring devices with the cloud computing environment that enables the collection, storage and access to data in ways that were never ...
Omolola Akinola+5 more
semanticscholar +1 more source
Practice on edge cloud security of telecom operators
Abstact: In the peak period of operator edge cloud construction, in order to realize the “three synchronization” construction strategy, the network edge cloud construction and operation and maintenance management mode were expounded, the security risks ...
Le ZHANG, Hongyuan MA
doaj +2 more sources
Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture
In the rapidly evolving realm of the Industrial Internet of Things (IIoT), securing shop floor operations, especially in audit processes, is of critical importance.
Fatemeh Stodt+4 more
doaj +1 more source
Cyber resilience and cyber security issues of intelligent cloud computing systems
It is necessary to provide the cyber security of cloud computing according to the components that constitute its structure. The first step in advancing the cyber security of this technology is to accurately identify its threats.
Fargana Abdullayeva
doaj
AI-Driven Proactive Cloud Application Data Access Security
The widespread adoption of cloud applications, accelerated by remote work demands, introduces new security challenges. Traditional approaches struggle to keep pace with the growing volume of cloud applications, keeping track of their user activities and ...
Priyanka Neelakrishnan
semanticscholar +1 more source
Abstract Direct comparisons of the effectiveness of the numerous novel therapies in the diffuse large B‐cell lymphoma (DLBCL) treatment landscape in a range of head‐to‐head randomized phase 3 trials would be time‐consuming and costly. Comparative effectiveness studies using real‐world data (RWD) represent a complementary approach.
Grzegorz Nowakowski+4 more
wiley +1 more source
An Overview of the Security Concerns in Enterprise Cloud Computing [PDF]
Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures.
arxiv +1 more source
Enhanced Fog Water Harvesting on Superhydrophobic Steel Meshes
Fog harvesting using mesh designs offers a sustainable solution to water scarcity. This study highlights key considerations for fog harvesting research and develops a methodology for a standardized protocol reflecting fog characteristics and environmental conditions.
Pegah Sartipizadeh+3 more
wiley +1 more source
Selecting a Secure Cloud Provider—An Empirical Study and Multi Criteria Approach
Security has become one of the primary factors that cloud customers consider when they select a cloud provider for migrating their data and applications into the Cloud.
Sebastian Pape+3 more
doaj +1 more source
Security of Cloud FPGAs: A Survey [PDF]
Integrating Field Programmable Gate Arrays (FPGAs) with cloud computing instances is a rapidly emerging trend on commercial cloud computing platforms such as Amazon Web Services (AWS), Huawei cloud, and Alibaba cloud. Cloud FPGAs allow cloud users to build hardware accelerators to speed up the computation in the cloud.
arxiv