A comprehensive review on deep learning algorithms: Security and privacy issues
Abstract Machine Learning (ML) algorithms are used to train the machines to perform
various complicated tasks that begin to modify and improve with experiences. It has become …
various complicated tasks that begin to modify and improve with experiences. It has become …
A review of deep learning security and privacy defensive techniques
In recent past years, Deep Learning presented an excellent performance in different areas
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …
Knowledge and innovative factors: how cloud computing improves students' academic performance
Purpose Collaboration, communication, critical thinking and creativity are the most essential
Cs of education. However, at present, these Cs are interlinked with technology to make it …
Cs of education. However, at present, these Cs are interlinked with technology to make it …
Predictive variables for agile development merging cloud computing services
Cloud Technology is a most challenging modern area in the field of modern technologies in
which assets (eg, CPU and capacity) can be rented and discharged by the clients through …
which assets (eg, CPU and capacity) can be rented and discharged by the clients through …
[HTML][HTML] To adopt or not to adopt? The determinants of cloud computing adoption in information technology sector
This research is mainly focused on the adoption of cloud computing in the information
technology (IT) industry of a developing country, Pakistan by using the theoretical lens of …
technology (IT) industry of a developing country, Pakistan by using the theoretical lens of …
[HTML][HTML] Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks
With the advent of cloud computing and wireless sensor networks, the number of
cyberattacks has rapidly increased. Therefore, the proportionate security of networks has …
cyberattacks has rapidly increased. Therefore, the proportionate security of networks has …
Determining factors influencing the acceptance of cloud computing implementation
Cloud computing (CC) has attracted many organizations to invest in this virtual storage
technology since it is seen to be able to help businesses in managing and sharing data in a …
technology since it is seen to be able to help businesses in managing and sharing data in a …
Evaluation of the challenges in the internet of medical things with multicriteria decision making (AHP and TOPSIS) to overcome its obstruction under fuzzy environment
The exponential speed of advancement of innovation has expanded the needs of all users
to avail all their information on the Internet 24/7. The Internet of things (IoT) enables smart …
to avail all their information on the Internet 24/7. The Internet of things (IoT) enables smart …
Electronic records management systems and the competency of educational institutions: Evidence from Yemen
In the modern world, the amount of information stored in modern technology has been
exponentially increasing. Access to vast amounts of information has changed how …
exponentially increasing. Access to vast amounts of information has changed how …
A framework strategy to overcome trust issues on cloud computing adoption in higher education
Cloud computing has the potential of adding strategic value to the higher education domain
owing to exemplary growth in ubiquitous data and communication services ranging from …
owing to exemplary growth in ubiquitous data and communication services ranging from …