Works matching Cloud computing security measures
1
- Journal of Information Assurance & Security, 2024, v. 19, n. 5, p. 180, doi. 10.2478/ias-2024-0013
- Agarwal, Anamika;
- Verma, Satya Bhushan;
- Gupta, Bineet Kumar;
- Singh, Suyogita
- Article
2
- Archives of Computational Methods in Engineering, 2024, v. 31, n. 7, p. 3857, doi. 10.1007/s11831-024-10095-6
- Gill, Komal Singh;
- Sharma, Anju;
- Saxena, Sharad
- Article
3
- Wireless Networks (10220038), 2025, v. 31, n. 1, p. 545, doi. 10.1007/s11276-024-03780-8
- Jasmine, R. Megiba;
- Jasper, J.;
- Geetha, M. R.
- Article
4
- Journal of Electronic Imaging, 2023, v. 32, n. 4, p. 42104, doi. 10.1117/1.JEI.32.4.042104
- Gagged, Ghanshyam;
- Murugaiyan, Jaisakthi
- Article
5
- Arab International Journal of Information Technology & Data, 2024, v. 4, n. 2, p. 15
- مروة رجاء القاضي;
- سوزان أحمد سلطان
- Article
6
- Applied Sciences (2076-3417), 2023, v. 13, n. 22, p. 12359, doi. 10.3390/app132212359
- Tuyishime, Emmanuel;
- Balan, Titus C.;
- Cotfas, Petru A.;
- Cotfas, Daniel T.;
- Rekeraho, Alexandre
- Article
7
- ITNOW, 2018, v. 60, n. 2, p. 38, doi. 10.1093/itnow/bwy048
- Article
8
- TEM Journal, 2025, v. 14, n. 2, p. 1140, doi. 10.18421/TEM142-15
- Article
9
- Neutrosophic Sets & Systems, 2025, v. 85, p. 960
- Fakhry, Ahmed E.;
- Gomaa, Mamdouh;
- Metwaly, Ahmed A.;
- Abdelhafeez, Ahmed
- Article
10
- Government Technology, 2017, v. 30, n. 4, p. 48
- Article
11
- Government Technology, 2015, v. 28, n. 6, p. 20
- Article
12
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 4, p. 1018, doi. 10.3390/jcp4040047
- Das, Swatisipra;
- Priyadarshini, Rojalina;
- Mishra, Minati;
- Barik, Rabindra Kumar
- Article
13
- Mugla Journal of Science & Technology, 2017, v. 3, n. 2, p. 122, doi. 10.22531/muglajsci.355273
- SOUBRA, Mohamad;
- TANRIÖVER, Ömer Özgür
- Article
14
- Traitement du Signal, 2025, v. 42, n. 2, p. 1123, doi. 10.18280/ts.420243
- Article
15
- Traitement du Signal, 2025, v. 42, n. 1, p. 29, doi. 10.18280/ts.420104
- Saranya, K.;
- Valarmathi, A.
- Article
16
- Document News, 2013, v. 31, n. 1, p. 8
- Article
17
- Document News, 2013, v. 31, n. 1, p. 8
- Article
18
- Khoj Journal of Indian Management Research & Practices, 2015, p. 54
- Article
19
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7876199
- Article
20
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/1791491
- Raghavendra, S.;
- Srividya, Putty;
- Mohseni, Milad;
- Bhaskar, Seelam Ch. Vijaya;
- Chaudhury, Sushovan;
- Sankaran, K. Sakthidasan;
- Singh, Bhupesh Kumar
- Article
21
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/5491411
- Article
22
- Acta Technica Corviniensis - Bulletin of Engineering, 2014, v. 7, n. 4, p. 159
- BHADAURIA, Rohit;
- CHAKI, Rituparna;
- CHAKI, Nabendu;
- SANYAL, Sugata
- Article
23
- Annals of the Faculty of Engineering Hunedoara - International Journal of Engineering, 2012, v. 10, n. 1, p. 71
- PAL, Shantanu;
- KHATUA, Sunirmal;
- CHAKI, Nabendu;
- SANYAL, Sugata
- Article
24
- Information (2078-2489), 2025, v. 16, n. 4, p. 291, doi. 10.3390/info16040291
- Abuhussein, Abdullah;
- Alsubaei, Faisal;
- Shandilya, Vivek;
- Sheldon, Fredrick;
- Shiva, Sajjan
- Article
25
- Information (2078-2489), 2024, v. 15, n. 9, p. 558, doi. 10.3390/info15090558
- Sharma, Neeraj A.;
- Kumar, Kunal;
- Khorshed, Tanzim;
- Ali, A B M Shawkat;
- Khalid, Haris M.;
- Muyeen, S. M.;
- Jose, Linju
- Article
26
- International Journal of Advances in Soft Computing & Its Applications, 2022, v. 14, n. 3, p. 17, doi. 10.15849/IJASCA.221128.02
- Article
27
- International Journal of Interactive Multimedia & Artificial Intelligence, 2015, v. 3, n. 3, p. 35, doi. 10.9781/ijimai.2015.334
- Venkateshwaran K.;
- Malviya, Anu;
- Dikshit, Utkarsha;
- Venkatesan, S.
- Article
28
- IT Professional, 2013, v. 15, n. 2, p. 22, doi. 10.1109/MITP.2012.43
- Idziorek, Joseph;
- Tannian, Mark F.;
- Jacobson, Doug
- Article
29
- IT Professional, 2012, v. 14, n. 4, p. 6, doi. 10.1109/MITP.2012.84
- Article
30
- IT Professional, 2010, v. 12, n. 4, p. 29, doi. 10.1109/MITP.2010.44
- Chakraborty, Rajarshi;
- Ramireddy, Srilakshmi;
- Raghu, T. S.;
- Rao, H. Raghav
- Article
31
- IT Professional, 2010, v. 12, n. 4, p. 38, doi. 10.1109/MITP.2009.89
- Vieira, Kleber;
- Schulter, Alexandre;
- Westphall, Carlos Becker;
- Westphall, Carla Merkle
- Article
32
- 2016
- Abbas, Haider;
- Ullah, Sana;
- Misra, Sudip;
- Chen, Yuh-Shyan
- Editorial
33
- Technology & Health Care, 2015, v. 23, p. S133, doi. 10.3233/THC-150945
- Zhiyi Shao;
- Bo Yang;
- Wenzheng Zhang;
- Yi Zhao;
- Zhenqiang Wu;
- Meixia Miao
- Article
34
- Interdisciplinary Description of Complex Systems, 2015, v. 13, n. 1, p. 9, doi. 10.7906/indecs.13.1.5
- Rubóczki, Edit Szilvia;
- Rajnai, Zoltán
- Article
35
- ComputerWorld Hong Kong, 2015, p. 94
- Article
36
- ComputerWorld Hong Kong, 2015, p. 8
- Article
37
- UMKC Law Review, 2014, v. 83, n. 2, p. 449
- Article
38
- Computational Intelligence & Neuroscience, 2022, p. 1, doi. 10.1155/2022/9151847
- Mishra, Narendra;
- Singh, R. K.;
- Yadav, S. K.
- Article
39
- International Journal of Simulation: Systems, Science & Technology, 2016, v. 17, n. 19, p. 20.1, doi. 10.5013/IJSSST.a.17.25.20
- Lili Wu;
- Jing Zhan;
- Yong Zhao;
- Jun Hu;
- Ming Li
- Article
40
- Special Education, 2022, v. 1, n. 43, p. 5359
- Vinjamuri, Lakshmi Priya;
- A., Aghanaashaa
- Article
41
- Actualidad Jurídica (1578-956X), 2015, n. 39, p. 244
- Article
42
- Journal of Supercomputing, 2013, v. 63, n. 2, p. 538, doi. 10.1007/s11227-012-0829-z
- Pervez, Zeeshan;
- Awan, Ammar;
- Khattak, Asad;
- Lee, Sungyoung;
- Huh, Eui-Nam
- Article
43
- Journal of Supercomputing, 2013, v. 63, n. 2, p. 561, doi. 10.1007/s11227-012-0831-5
- Modi, Chirag;
- Patel, Dhiren;
- Borisaniya, Bhavesh;
- Patel, Avi;
- Rajarajan, Muttukrishnan
- Article
44
- International Journal of Wireless & Ad Hoc Communication, 2023, v. 7, n. 1, p. 50, doi. 10.54216/IJWAC.070105
- Safar, Faya;
- Al King, Raddad
- Article
45
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 270, doi. 10.54216/JCIM.150121
- Hamid, Nagham;
- Kaitan, Nada Mahdi;
- Mohsen, Sanaa
- Article
46
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 79, doi. 10.54216/JCIM.140106
- Saffran, Mohammed;
- Mishra, Shailendra
- Article
47
- Journal of Cybersecurity & Information Management, 2023, v. 11, n. 1, p. 22, doi. 10.54216/JCIM.110102
- Nasir, Manal M.;
- Hebrisha, Salim M.
- Article
48
- Journal of Industrial Microbiology & Biotechnology, 2018, v. 45, n. 7, p. 529, doi. 10.1007/s10295-018-2009-5
- Scheitz, Cornelia Johanna Franziska;
- Peck, Lawrence J.;
- Groban, Eli S.
- Article
49
- Computer Measurement & Control, 2018, v. 26, n. 2, p. 142, doi. 10.16526/j.cnki.11-4762/tp.2018.02.035
- Article
50
- Review of Computer Engineering Studies, 2022, v. 9, n. 4, p. 145, doi. 10.18280/rces.090404
- Article