Search

Your search keyword '"cloud security"' showing total 901 results

Search Constraints

Start Over You searched for: Descriptor "cloud security" Remove constraint Descriptor: "cloud security" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
901 results on '"cloud security"'

Search Results

6. Detection and mitigation of TCP-based DDoS attacks in cloud environments using a self-attention and intersample attention transformer model: Detection and mitigation...: K. G. et al.

7. Integrating blockchain, internet of things, and cloud for secure healthcare.

8. ADVANCED SECURITY AND PRIVACY IN CLOUD COMPUTING: ENHANCING DATA PROTECTION WITH MULTIKEYWORD RANKED SEARCH IN ENCRYPTED ENVIRONMENTS.

9. Implementing Identity-based Signature Schemes for Secure Data Transfer in Cloud Computing Environments

10. Exploring Security Enhancements in Kubernetes CNI: A Deep Dive Into Network Policies

11. Memory management of firewall filtering rules using modified tree rule approach.

12. Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study

13. I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach

14. Optimizing encrypted search in the cloud using autoencoder-based query approximation.

15. Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study.

16. Forensic Investigation Capabilities of Microsoft Azure: A Comprehensive Analysis and Its Significance in Advancing Cloud Cyber Forensics.

17. Securing IoMT Applications: An Approach for Enhancing the Reliability of Security Policies within Cloud Databases.

18. Enhancing network security using unsupervised learning approach to combat zero-day attack.

19. I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach.

20. Technical sandbox for a Global Patient co-Owned Cloud (GPOC).

21. The significance of artificial intelligence in zero trust technologies: a comprehensive review

22. Trust value evaluation of cloud service providers using fuzzy inference based analytical process

23. Optimizing data retrieval for enhanced data integrity verification in cloud environments

24. An Improved Co-Resident Attack Defense Strategy Based on Multi-Level Tenant Classification in Public Cloud Platforms.

25. Trust value evaluation of cloud service providers using fuzzy inference based analytical process.

26. The significance of artificial intelligence in zero trust technologies: a comprehensive review.

27. Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review.

28. IoT Collected Health Data to Store in Cloud and Access with PCMAE.

29. A Novel Hybrid Unsupervised Learning Approach for Enhanced Cybersecurity in the IoT.

30. A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems

31. A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems.

32. A Survey on Searchable Symmetric Encryption.

33. Intelligent model for the detection and classification of encrypted network traffic in cloud infrastructure.

34. Integrated cybersecurity for metaverse systems operating with artificial intelligence, blockchains, and cloud computing.

35. Cloud Security Using Fine-Grained Efficient Information Flow Tracking.

36. A Survey of Security Challenges in Cloud-Based SCADA Systems.

37. Advancements in detecting, preventing, and mitigating DDoS attacks in cloud environments: A comprehensive systematic review of state-of-the-art approaches

38. SECURITY PRINCIPLES IN CLOUD COMPUTING.

39. Biometric Fusion for Enhanced Authentication in Cloud Computing Environments

40. Securing cloud-enabled smart cities by detecting intrusion using spark-based stacking ensemble of machine learning algorithms

41. Robustness of Workload Forecasting Models in Cloud Data Centers: A White-Box Adversarial Attack Perspective

42. Converging Technologies for Health Prediction and Intrusion Detection in Internet of Healthcare Things With Matrix- Valued Neural Coordinated Federated Intelligence

43. Selection of Cloud Security by Employing MABAC Technique in the Environment of Hesitant Bipolar Complex Fuzzy Information

44. Secure Healthcare Access Control System (SHACS) for Anomaly Detection and Enhanced Security in Cloud-Based Healthcare Applications

45. Cloud computing : technologies and strategies of the ubiquitous data center.

46. The Information Richness Assessment of Information Security Awareness in Iranian Cloud Storage Users: Case Study of iCloud

47. Intelligent model for the detection and classification of encrypted network traffic in cloud infrastructure

48. A Multilayered Approach to Enhance Cloud Security using Homomorphic, AES, and Hashgraph

50. A hybrid deep learning approach for enhanced network intrusion detection.

Catalog

Books, media, physical & digital resources