An enhanced and secure cloud infrastructure for e-health data transmission
The daily rapid malware growth and spread has enforced the security community of antivirus
companies to introduce cloud computing technology to their existing protection methods so …
companies to introduce cloud computing technology to their existing protection methods so …
Dynamic resource allocation for big data streams based on data characteristics (5 V s)
Various Internet‐based applications such as social media, business transactions, mobile
applications, cyber‐physical systems, and Internet of Things have led to the generation of …
applications, cyber‐physical systems, and Internet of Things have led to the generation of …
Η χρήση νέων τεχνολογιών πληροφορικής και επικοινωνιών στους τομείς της γεωργίας και της κτηνοτροφίας και τα ζητήματα ασφάλειας δεδομένων που προκύπτουν
Σ Αναστασοπούλου - dspace.lib.uom.gr
Οι τελευταίες εξελίξεις στον τομέα των Τεχνολογιών Πληροφορικής και Επικοινωνιών (ΤΠΕ),
προσφέρουν στους χρήστες τη δυνατότητα συγκέντρωσης, επεξεργασίας και ανάλυσης …
προσφέρουν στους χρήστες τη δυνατότητα συγκέντρωσης, επεξεργασίας και ανάλυσης …
Infrastructure as a Service (IaaS) in Centre for Research and Technology Hellas (CERTH)
Ι Κουιμτζής - dspace.lib.uom.gr
In this paper we explore whether and in what way Cloud Computing and particularly
Infrastructure as a Service (IaaS) can improve the services that Information Technology can …
Infrastructure as a Service (IaaS) can improve the services that Information Technology can …
Crypto-Ransomware Detection through the Use of k-Nearest Neighbor Machine Learning Algorithm
NR Wray - 2018 - search.proquest.com
In this quasi-experimental quantitative study, the efficacy of the k-Nearest Neighbor machine
learning algorithm was compared to signature-based antivirus when detecting crypto …
learning algorithm was compared to signature-based antivirus when detecting crypto …