Search

Your search keyword '"cloud security"' showing total 1,861 results

Search Constraints

Start Over You searched for: Descriptor "cloud security" Remove constraint Descriptor: "cloud security"
1,861 results on '"cloud security"'

Search Results

51. Trust value evaluation of cloud service providers using fuzzy inference based analytical process.

52. The significance of artificial intelligence in zero trust technologies: a comprehensive review.

53. Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review.

54. IoT Collected Health Data to Store in Cloud and Access with PCMAE.

55. Multi-level authentication for security in cloud using improved quantum key distribution.

56. Blockchain‐cloud integration: Comprehensive survey and open research issues.

57. Managing cloud security in the presence of strategic hacker and joint responsibility.

58. A Novel Hybrid Unsupervised Learning Approach for Enhanced Cybersecurity in the IoT.

59. Blockchain and Cloud Security—A Review

60. Fortifying Health-Care Data Security in Cloud Environments

61. Loopholes in Security Implementation of Cloud and IoT Environment: Case Study of a Recent Security Incident

62. Research on Security Investment Strategy of Cloud Service Providers and Users Based on Differential Game

63. Security Perspectives in Integrity Verification for Shared Data in Cloud—A Survey

64. Securing Kubernetes: A Study on the Measures for Enhancing Control and Data Plane Security

66. Enhancing Cloud Security and Resource Management: A Comprehensive Review

67. An Efficient Administration for Multiple Firewalls in Cloud Environments

69. Security Threats and Data Protection Methods Used in Cloud Computing: A Review

70. Leveraging Meta-Learning for Dynamic Anomaly Detection in Zero Trust Clouds

71. Securing Cloud Computing Using Access Control Systems: A Comprehensive Review

75. A Blockchain-Based Approach to Improve Data Integrity in Federated Cloud Environment

76. Detecting DoS Outbreaks in Cloud Environment Using Machine Learning Algorithms in Hadoop Cluster

77. Penetration Testing for the Cloud-Based Web Application

78. Emerging Trends in Cloud Computing Paradigm: An Extensive Literature Review on Cloud Security, Service Models, and Practical Suggestions

79. Security and Privacy Protection of Medical Images Using Pascal’s Triangle Chaotic Scheme in Cloud Storage

80. Enhanced Dynamic Remote Data Possession Checking Protocol with Unlimited Number of Verifications and Public Verifiability for Ensuring Cloud Data Integrity

82. A Modest Approach Toward Cloud Security Hygiene

84. Security in Cloud Computing Using Blockchain: A Comprehensive Survey

85. Cloud Data Security Using Hybrid Encryption with Blockchain

87. Cloud Intrusion Detection System Based on Honeynet, Honeywell, Honeypot, and Honeytoken Strategies

89. Understanding Security Challenges and Defending Access Control Models for Cloud-Based Internet of Things Network

90. Research on the Security Assessment of Cloud Communication in Intelligent Connected Vehicle

91. A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems

95. A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis.

96. Cloud security game theory scoring from predation models in simulation.

97. Dynamic authentication for intelligent sensor clouds in the Internet of Things.

98. A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems.

99. A Survey on Searchable Symmetric Encryption.

100. Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures.

Catalog

Books, media, physical & digital resources