Works matching DE "CLOUD computing security measures"
Results: 312
Homomorphic with Henon-Map Encryption over Medical Image Data Confidentiality in Cloud and Classifying Images Using Deep Learning Approaches in IoT.
- Published in:
- Traitement du Signal, 2025, v. 42, n. 1, p. 29, doi. 10.18280/ts.420104
- By:
- Publication type:
- Article
An Overview of Distributed Firewalls and Controllers Intended for Mobile Cloud Computing.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 1931, doi. 10.3390/app15041931
- By:
- Publication type:
- Article
PROTECCIÓN DE DATOS.
- Published in:
- Actualidad Jurídica (1578-956X), 2015, n. 39, p. 244
- Publication type:
- Article
Biotechnology software in the digital age: are you winning?
- Published in:
- Journal of Industrial Microbiology & Biotechnology, 2018, v. 45, n. 7, p. 529, doi. 10.1007/s10295-018-2009-5
- By:
- Publication type:
- Article
PRIVACY AND SECURITY IN THE CLOUD: SOME REALISM ABOUT TECHNICAL SOLUTIONS TO TRANSNATIONAL SURVEILLANCE IN THE POST-SNOWDEN ERA.
- Published in:
- Maine Law Review, 2014, v. 66, n. 2, p. 487
- By:
- Publication type:
- Article
AN ASSESSMENT OF RECENT CLOUD SECURITY MEASURE PROPOSALS IN COMPARISON TO THEIR SUPPORT BY WIDELY USED CLOUD SERVICE PROVIDERS.
- Published in:
- Mugla Journal of Science & Technology, 2017, v. 3, n. 2, p. 122, doi. 10.22531/muglajsci.355273
- By:
- Publication type:
- Article
DevSecOps at NIST.
- Published in:
- 2023
- By:
- Publication type:
- Proceeding
Practical Approaches to Overcome Security Challenges in Cloud Computing: Part 2: Private Cloud.
- Published in:
- ISSA Journal, 2019, v. 17, n. 1, p. 41
- By:
- Publication type:
- Article
Practical Approaches to Overcome Security Challenges in Cloud Computing.
- Published in:
- ISSA Journal, 2018, v. 16, n. 12, p. 30
- By:
- Publication type:
- Article
The Erosion of Two-Factor Authentication.
- Published in:
- ISSA Journal, 2018, v. 16, n. 10, p. 6
- By:
- Publication type:
- Article
Cloud Security, Two Years Later.
- Published in:
- ISSA Journal, 2018, v. 16, n. 10, p. 5
- By:
- Publication type:
- Article
Security and Privacy in Vehicular Clouds.
- Published in:
- ISSA Journal, 2017, v. 15, n. 11, p. 8
- By:
- Publication type:
- Article
Securing the Cloud.
- Published in:
- ISSA Journal, 2016, v. 14, n. 1, p. 33
- By:
- Publication type:
- Article
Bring Your Own Solution.
- Published in:
- ISSA Journal, 2016, v. 14, n. 1, p. 6
- By:
- Publication type:
- Article
Cloud Security for a New Year.
- Published in:
- ISSA Journal, 2016, v. 14, n. 1, p. 5
- By:
- Publication type:
- Article
Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone.
- Published in:
- TEM Journal, 2018, v. 7, n. 3, p. 475, doi. 10.18421/TEM73-01
- By:
- Publication type:
- Article
Secure cloud computing: leveraging GNN and leader K-means for intrusion detection optimization.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-81442-7
- By:
- Publication type:
- Article
Trust value evaluation of cloud service providers using fuzzy inference based analytical process.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-69134-8
- By:
- Publication type:
- Article
Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology.
- Published in:
- Networks & Heterogeneous Media, 2023, v. 18, n. 3, p. 1, doi. 10.3934/nhm.2023057
- By:
- Publication type:
- Article
CLOUD COMPUTING SECURITY ISSUES.
- Published in:
- Journal of Defense Resources Management, 2012, v. 3, n. 2, p. 141
- By:
- Publication type:
- Article
Cloud Security Using Fine-Grained Efficient Information Flow Tracking.
- Published in:
- Future Internet, 2024, v. 16, n. 4, p. 110, doi. 10.3390/fi16040110
- By:
- Publication type:
- Article
A Survey on Intrusion Detection Systems for Fog and Cloud Computing.
- Published in:
- Future Internet, 2022, v. 14, n. 3, p. 89, doi. 10.3390/fi14030089
- By:
- Publication type:
- Article
Security and Privacy in Cloud Computing: Technical Review.
- Published in:
- Future Internet, 2022, v. 14, n. 1, p. 11, doi. 10.3390/fi14010011
- By:
- Publication type:
- Article
A Framework for Security Transparency in Cloud Computing.
- Published in:
- Future Internet, 2016, v. 8, n. 1, p. 5, doi. 10.3390/fi8010005
- By:
- Publication type:
- Article
Cyberattacks and Security of Cloud Computing: A Complete Guideline.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 11, p. 1981, doi. 10.3390/sym15111981
- By:
- Publication type:
- Article
Real-Time Risk Detection Method and Protection Strategy for Intelligent Ship Network Security Based on Cloud Computing.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 5, p. 988, doi. 10.3390/sym15050988
- By:
- Publication type:
- Article
Special Issue: Symmetric and Asymmetric Encryption in Blockchain.
- Published in:
- 2023
- By:
- Publication type:
- Editorial
Toward Efficient Intrusion Detection System Using Hybrid Deep Learning Approach.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 9, p. 1916, doi. 10.3390/sym14091916
- By:
- Publication type:
- Article
Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 6, p. N.PAG, doi. 10.3390/sym14061095
- By:
- Publication type:
- Article
Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 4, p. N.PAG, doi. 10.3390/sym14040695
- By:
- Publication type:
- Article
Strengthening Cloud Computing Security: A Malware Prevention and Detection Framework at the Hypervisor Level.
- Published in:
- Journal of Information Assurance & Security, 2024, v. 19, n. 5, p. 180, doi. 10.2478/ias-2024-0013
- By:
- Publication type:
- Article
Improved End-to-End Data Security Approach for Cloud Computing.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 22, p. 16010, doi. 10.3390/su152216010
- By:
- Publication type:
- Article
Security of Cloud System by IDS-AM-Clust.
- Published in:
- International Review on Computers & Software, 2018, v. 13, n. 1, p. 1, doi. 10.15866/irecos.v13i1.15644
- By:
- Publication type:
- Article
An Information Dispersal Algorithm Based Technique for Backup of Data in Cloud Data Centers.
- Published in:
- International Review on Computers & Software, 2015, v. 10, n. 2, p. 144, doi. 10.15866/irecos.v10i2.5542
- By:
- Publication type:
- Article
DID THE NATIONAL SECURITY AGENCY DESTROY THE PROSPECTS FOR CONFIDENTIALITY AND PRIVILEGE WHEN LAWYERS STORE CLIENTS' FILES IN THE CLOUD - AND WHAT, IF ANYTHING, CAN LAWYERS AND LAW FIRMS REALISTICALLY DO IN RESPONSE?
- Published in:
- Northern Kentucky Law Review, 2014, v. 41, n. 3, p. 405
- By:
- Publication type:
- Article
Zero-trust based dynamic access control for cloud computing.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00320-x
- By:
- Publication type:
- Article
Security Issues in Cloud Computing.
- Published in:
- GSTF Journal on Computing, 2011, v. 1, n. 3, p. 1
- By:
- Publication type:
- Article
Privacy Preservation of Data in Amalgamation with Cloud Computing and E-commerce.
- Published in:
- Khoj Journal of Indian Management Research & Practices, 2015, p. 54
- By:
- Publication type:
- Article
A Multidimension Taxonomy of Insider Threats in Cloud Computing.
- Published in:
- Computer Journal, 2016, v. 59, n. 11, p. 1612, doi. 10.1093/comjnl/bxw020
- By:
- Publication type:
- Article
Trust Enhanced Security for Tenant Transactions in the Cloud Environment.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2388, doi. 10.1093/comjnl/bxu048
- By:
- Publication type:
- Article
Special Issue on Secure Information Systems Engineering.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2193, doi. 10.1093/comjnl/bxv020
- By:
- Publication type:
- Article
The Coming Disruption of Drones, Robots, and Bots: How Will It Affect CPAs and Accounting Practice?
- Published in:
- CPA Journal, 2017, v. 87, n. 6, p. 40
- By:
- Publication type:
- Article
Controlling Cloud Data Access Based on Reputation.
- Published in:
- Mobile Networks & Applications, 2015, v. 20, n. 6, p. 828, doi. 10.1007/s11036-015-0591-6
- By:
- Publication type:
- Article
Editorial: Recent Advances on the Next Generation of Mobile Networks and Services.
- Published in:
- 2015
- By:
- Publication type:
- Editorial
An efficient secure cryptosystem using improved identity based encryption with multimodal biometric authentication and authorization in cloud environments.
- Published in:
- Wireless Networks (10220038), 2025, v. 31, n. 1, p. 545, doi. 10.1007/s11276-024-03780-8
- By:
- Publication type:
- Article
INNOVATIVE APPROACH ENSURING SECURITY AND PRIVACY IN CLOUD COMPUTING.
- Published in:
- Pakistan Journal of Science, 2016, v. 68, n. 1, p. 42
- By:
- Publication type:
- Article
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices.
- Published in:
- ISeCure, 2024, v. 16, n. 1, p. 93, doi. 10.22042/isecure.2023.395028.954
- By:
- Publication type:
- Article
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.
- Published in:
- ISeCure, 2023, v. 15, n. 1, p. 1, doi. 10.22042/ISECURE.2022.312328.718
- By:
- Publication type:
- Article
Editorial.
- Published in:
- ISeCure, 2014, v. 6, n. 2, p. 97
- By:
- Publication type:
- Article
A Risk Model for Cloud Processes.
- Published in:
- ISeCure, 2014, v. 6, n. 2, p. 99
- By:
- Publication type:
- Article