A comprehensive review on deep learning algorithms: Security and privacy issues

M Tayyab, M Marjani, NZ Jhanjhi, IAT Hashem… - Computers & …, 2023 - Elsevier
Abstract Machine Learning (ML) algorithms are used to train the machines to perform
various complicated tasks that begin to modify and improve with experiences. It has become …

A review of deep learning security and privacy defensive techniques

MI Tariq, NA Memon, S Ahmed… - Mobile Information …, 2020 - Wiley Online Library
In recent past years, Deep Learning presented an excellent performance in different areas
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …

Knowledge and innovative factors: how cloud computing improves students' academic performance

SA Raza, KA Khan - Interactive Technology and Smart Education, 2022 - emerald.com
Purpose Collaboration, communication, critical thinking and creativity are the most essential
Cs of education. However, at present, these Cs are interlinked with technology to make it …

Predictive variables for agile development merging cloud computing services

SA Butt, MI Tariq, T Jamal, A Ali, JLD Martinez… - IEEE …, 2019 - ieeexplore.ieee.org
Cloud Technology is a most challenging modern area in the field of modern technologies in
which assets (eg, CPU and capacity) can be rented and discharged by the clients through …

[HTML][HTML] To adopt or not to adopt? The determinants of cloud computing adoption in information technology sector

A Hassan, SH Bhatti, S Shujaat, Y Hwang - Decision Analytics Journal, 2022 - Elsevier
This research is mainly focused on the adoption of cloud computing in the information
technology (IT) industry of a developing country, Pakistan by using the theoretical lens of …

[HTML][HTML] Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks

MI Tariq, S Ahmed, NA Memon, S Tayyaba, MW Ashraf… - Sensors, 2020 - mdpi.com
With the advent of cloud computing and wireless sensor networks, the number of
cyberattacks has rapidly increased. Therefore, the proportionate security of networks has …

Determining factors influencing the acceptance of cloud computing implementation

MT Amron, R Ibrahim, NAA Bakar, S Chuprat - Procedia Computer Science, 2019 - Elsevier
Cloud computing (CC) has attracted many organizations to invest in this virtual storage
technology since it is seen to be able to help businesses in managing and sharing data in a …

Evaluation of the challenges in the internet of medical things with multicriteria decision making (AHP and TOPSIS) to overcome its obstruction under fuzzy environment

MI Tariq, NA Mian, A Sohail, T Alyas… - Mobile Information …, 2020 - Wiley Online Library
The exponential speed of advancement of innovation has expanded the needs of all users
to avail all their information on the Internet 24/7. The Internet of things (IoT) enables smart …

Electronic records management systems and the competency of educational institutions: Evidence from Yemen

M Mukred, ZM Yusof, WA Al-Moallemi… - Information …, 2022 - journals.sagepub.com
In the modern world, the amount of information stored in modern technology has been
exponentially increasing. Access to vast amounts of information has changed how …

A framework strategy to overcome trust issues on cloud computing adoption in higher education

M Ali, T Wood-Harper, R Ramlogan - Modern principles, practices …, 2020 - igi-global.com
Cloud computing has the potential of adding strategic value to the higher education domain
owing to exemplary growth in ubiquitous data and communication services ranging from …