[HTML][HTML] A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain

H Pourrahmani, A Yavarinasab, AMH Monazzah - Internet of Things, 2023 - Elsevier
The current advances in the Internet of Things (IoT) and the solutions being offered by this
technology have accounted IoT among the top ten technologies that will transform the global …

Fog service in space information network: Architecture, use case, security and challenges

J Guo, Y Du - IEEE Access, 2020 - ieeexplore.ieee.org
As a large heterogeneous information infrastructure, space terrestrial coinformation network
provides a reliable and effective services for all types of space-based users, aviation users …

Root disease classification with hybrid optimization models in IoT

DFS Jayapalan, JP Ananth - Expert Systems with Applications, 2023 - Elsevier
The environment sensing and image processing are integrated with the Internet of Things
(IoT), which is considered a novel platform for monitoring plant health. The main limitation of …

Adopting information security techniques for cloud computing—a survey

T Mahboob, M Zahid, G Ahmad - 2016 1st International …, 2016 - ieeexplore.ieee.org
Cloud Computing is widely used technique for data storage on-demand but involves risk
such as data security, privacy protection, access-control and data confidentiality. Present …

Security architecture and protocol for trust verifications regarding the integrity of files stored in cloud services

A Pinheiro, E Dias Canedo, RT de Sousa Junior… - Sensors, 2018 - mdpi.com
Cloud computing is considered an interesting paradigm due to its scalability, availability and
virtually unlimited storage capacity. However, it is challenging to organize a cloud storage …

Extraction of Technical Indicators and Data Augmentation-Based Stock Market Prediction Using Deep LSTM Integrated Competitive Swarm Feedback Algorithm

N Yadav Vanguri, S Pazhanirajan… - International Journal of …, 2023 - World Scientific
In recent decades, time-series analysis and value forecasting have grown in research fields.
Making a significant decision in the stock market prediction strategy requires knowledge that …

[PDF][PDF] ADRCN: A framework to detect and mitigate malicious Insider Attacks in Cloud-Based environment on IaaS

P Oberoi, S Mittal, RK Gujral - International Journal of …, 2019 - researchgate.net
Security is a critical factor for any of the computing platforms. Cloud computing is a new
computing environment but still, its basic technology is the Internet. Thus, Cloud computing …

Secure Multi-party Key-Value Data Statistics Against Malicious Models

J Zhao, Y Zhang, C Hu - Procedia Computer Science, 2024 - Elsevier
Recently, key-value storage has become the primary paradigm for managing associative
data due to its simplicity and efficiency, and is widely used in various fields. However, key …

Multilevel User Verification in Cloud Banking System

A Biswas, A Roy - … on Computational Intelligence, Data Science and …, 2021 - Springer
The recent incidents of sky high fraudulent banking transactions, ponzi monetary schemes
and its corresponding corruption charges have shaken the economic backbone of India. Its …

A trusted authentication model for remote users under cloud architecture

Y Song, Z Liao, Y Liang - International Journal of Internet …, 2018 - inderscienceonline.com
Trusted computing is principle measure to ensure the security of computing platform, which
improves the creditability by functions including data protection, identity authentication …