Search

Your search keyword '"cloud security"' showing total 1,861 results

Search Constraints

Start Over You searched for: Descriptor "cloud security" Remove constraint Descriptor: "cloud security"
1,861 results on '"cloud security"'

Search Results

7. Multiple Intrusion Detection in Complex Cloud Environments Using Random Forest and Deep Learning on the UNSW-NB15 Benchmark Datasets

9. New Cloud Computing Authentication Based on Secure Hash Algorithm (SHA-3) and Lightweight Sosemanuk Algorithm

10. Technical Concepts on Cloud Security and Privacy Using Deep Learning Techniques and Hybridized Encryption

12. Dark Clouds on the Horizon? Effects of Cloud Storage on Security Breaches.

13. RT-PPS: Real-time privacy-preserving scheme for cloud-hosted IoT data.

14. Detection and mitigation of TCP-based DDoS attacks in cloud environments using a self-attention and intersample attention transformer model: Detection and mitigation...: K. G. et al.

15. Enhancing cloud security with intelligent load balancing and malicious request classification.

16. An efficient position-sensitive fuzzy keyword search scheme for encrypted data on hybrid cloud.

17. pbins: private bins for top-k semantic search over encrypted data using transformers.

18. Integrating blockchain, internet of things, and cloud for secure healthcare.

19. ADVANCED SECURITY AND PRIVACY IN CLOUD COMPUTING: ENHANCING DATA PROTECTION WITH MULTIKEYWORD RANKED SEARCH IN ENCRYPTED ENVIRONMENTS.

20. Implementing Identity-based Signature Schemes for Secure Data Transfer in Cloud Computing Environments

21. Exploring Security Enhancements in Kubernetes CNI: A Deep Dive Into Network Policies

22. Memory management of firewall filtering rules using modified tree rule approach.

23. QoS-Aware cloud security using lightweight EfficientNet with Adaptive Sparse Bayesian Optimization.

24. AAQ-PEKS: An Attribute-based Anti-Quantum Public Key Encryption Scheme with Keyword Search for E-healthcare Scenarios.

25. Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study

26. I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach

27. Optimizing encrypted search in the cloud using autoencoder-based query approximation.

28. Improved Machine Learning Techniques for Precise DoS Attack Forecasting in Cloud Security.

29. An Intelligent Lightweight Signing Signature and Secured Jellyfish Data Aggregation (LS3JDA) Based Privacy Preserving Model in Cloud.

30. Securing cloud access with enhanced attribute-based cryptography.

31. KubeDeceive: Unveiling Deceptive Approaches to Protect Kubernetes Clusters.

32. Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study.

33. Forensic Investigation Capabilities of Microsoft Azure: A Comprehensive Analysis and Its Significance in Advancing Cloud Cyber Forensics.

34. Securing IoMT Applications: An Approach for Enhancing the Reliability of Security Policies within Cloud Databases.

35. Enhancing network security using unsupervised learning approach to combat zero-day attack.

36. I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach.

37. Technical sandbox for a Global Patient co-Owned Cloud (GPOC).

38. Harnessing DBSCAN and auto-encoder for hyper intrusion detection in cloud computing.

39. Enhancing Cloud Security Through Block Chain: A Data Integrity and Trust Approach.

40. Data Recovery in Cloud Data Storage.

44. The significance of artificial intelligence in zero trust technologies: a comprehensive review

45. Trust value evaluation of cloud service providers using fuzzy inference based analytical process

46. Optimizing data retrieval for enhanced data integrity verification in cloud environments

47. PRC6: Hybrid lightweight cipher for enhanced cloud data security in parallel environment.

48. Malicious clouds coalition management for business processes deployment.

49. An Improved Co-Resident Attack Defense Strategy Based on Multi-Level Tenant Classification in Public Cloud Platforms.

50. Machine learning-based intelligent security framework for secure cloud key management.

Catalog

Books, media, physical & digital resources