Search

Your search keyword '"*CLOUD computing security measures"' showing total 305 results

Search Constraints

Start Over You searched for: Descriptor "*CLOUD computing security measures" Remove constraint Descriptor: "*CLOUD computing security measures"
305 results on '"*CLOUD computing security measures"'

Search Results

1. Why Should I Trust Your Code?

2. Creating the First Confidential GPUs.

3. Hardware VM Isolation in the Cloud.

4. Securing the cloud: An in-depth review of security threats in cloud computing.

5. Cloud computing security challenges and related mitigation strategies.

6. Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things.

7. Performance of Secure Framework AES Algorithm using Cloud Computing.

8. A review on cloud computing security challenges, attacks and its countermeasures.

9. Close: A survey on cloud security issues.

10. A novel multi-scale CNN and Bi-LSTM arbitration dense network model for low-rate DDoS attack detection.

11. Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data.

12. RSA security in cloud computing: A distributed model for integrated GNFS with Black Wiedemann algorithm for integer factorization.

13. Cloud computing: Security measures and applications.

14. Cloud computing: Exploration of security issues with alleviating techniques.

15. An identity management scheme for cloud computing: Review, challenges, and future directions.

16. Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems.

17. Cyberattacks and Security of Cloud Computing: A Complete Guideline.

18. Use of homomorphic encryption techniques for secure cloud computing.

19. Implementation of a healthcare monitoring system based on IoT.

20. Confidential Computing: Elevating Cloud Security and Privacy.

21. A novel approach for an efficient and secure image identity-based signature computing system.

22. ANN based security in mobile cloud computing.

23. Emerging trends of privacy and security in cloud computing.

24. Design and development of novel security approach designed for cloud computing with load balancing.

25. DPC2-CD: a secure architecture and methods for distributed processing and concurrency control in cloud databases.

26. Real-Time Risk Detection Method and Protection Strategy for Intelligent Ship Network Security Based on Cloud Computing.

27. Toward Confidential Cloud Computing.

28. Comprehensive survey of cloud intrusion detection system.

29. New hybrid encryption algorithm for cloud computing security using chaotic system and mCrypton-salsa20 algorithms.

30. A review on cloud computing security issues.

31. GDPR Anti- Patterns.

32. Secure matrix multiplication based on fully homomorphic encryption.

33. Cloud Computing Security: Machine and Deep Learning Models Analysis.

34. Special Issue: Symmetric and Asymmetric Encryption in Blockchain.

35. Security issues of big data in the cloud computing platform.

36. Cryptochain approach to cloud computing security: Case study, challenges, and solutions.

37. Malicious attack detection approach in cloud computing using machine learning techniques.

38. Security Issues in Cloud and Mobile cloud: A Comprehensive Survey.

39. A novel method for mobile cloud computing security system.

40. The Layers of Cloud Computing Infrastructure and Security Attacking Issues.

41. An Empirical Client Cloud Environment to Secure Data Communication with Alert Protocol.

42. Enhancing Security of Mobile Cloud Computing by Trust- and Role-Based Access Control.

43. Toward Efficient Intrusion Detection System Using Hybrid Deep Learning Approach.

44. Renewable energy management in smart grid with cloud security analysis using multi agent machine learning model.

45. DDoS attack prediction using a honey badger optimization algorithm based feature selection and Bi-LSTM in cloud environment.

46. Detection of DDoS Vulnerability in Cloud Computing Using the Perplexed Bayes Classifier.

47. Face recognition and real-time tracking system based on convolutional neural network and parallel-cascade PID controller.

48. Elliptic Curve Cryptography Performance Evaluation for Securing Multi Factor Systems in a Cloud Computing Environment.

49. Trust management for internet of things using cloud computing and security in smart cities.

50. Chaos based image encryption security in cloud computing.

Catalog

Books, media, physical & digital resources