An enhanced and secure cloud infrastructure for e-health data transmission

VA Memos, KE Psannis, SK Goudos… - Wireless Personal …, 2021 - Springer
The daily rapid malware growth and spread has enforced the security community of antivirus
companies to introduce cloud computing technology to their existing protection methods so …

Dynamic resource allocation for big data streams based on data characteristics (5 V s)

N Kaur, SK Sood - International Journal of Network …, 2017 - Wiley Online Library
Various Internet‐based applications such as social media, business transactions, mobile
applications, cyber‐physical systems, and Internet of Things have led to the generation of …

Η χρήση νέων τεχνολογιών πληροφορικής και επικοινωνιών στους τομείς της γεωργίας και της κτηνοτροφίας και τα ζητήματα ασφάλειας δεδομένων που προκύπτουν

Σ Αναστασοπούλου - dspace.lib.uom.gr
Οι τελευταίες εξελίξεις στον τομέα των Τεχνολογιών Πληροφορικής και Επικοινωνιών (ΤΠΕ),
προσφέρουν στους χρήστες τη δυνατότητα συγκέντρωσης, επεξεργασίας και ανάλυσης …

Infrastructure as a Service (IaaS) in Centre for Research and Technology Hellas (CERTH)

Ι Κουιμτζής - dspace.lib.uom.gr
In this paper we explore whether and in what way Cloud Computing and particularly
Infrastructure as a Service (IaaS) can improve the services that Information Technology can …

Crypto-Ransomware Detection through the Use of k-Nearest Neighbor Machine Learning Algorithm

NR Wray - 2018 - search.proquest.com
In this quasi-experimental quantitative study, the efficacy of the k-Nearest Neighbor machine
learning algorithm was compared to signature-based antivirus when detecting crypto …