Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review
The emergence of Internet of Things (IoT) has introduced smart objects as the fundamental
building blocks for developing a smart cyber-physical universal environment. The IoTs have …
building blocks for developing a smart cyber-physical universal environment. The IoTs have …
WITHDRAWN: An energy efficient load balancing on cloud computing using adaptive cat swarm optimization
Withdrawal Notice WITHDRAWN: An energy efficient load balancing on cloud computing
using adaptive cat swarm optimizationK. Balaji a, â‡', P. Sai Kiran b, M. Sunil Kumar ca …
using adaptive cat swarm optimizationK. Balaji a, â‡', P. Sai Kiran b, M. Sunil Kumar ca …
[PDF][PDF] Dynamic time slice calculation for round robin process scheduling using NOC
Process scheduling means allocating a certain amount of CPU time to each of the user
processes. One of the popular scheduling algorithms is the “Round Robin” algorithm, which …
processes. One of the popular scheduling algorithms is the “Round Robin” algorithm, which …
The Enemy Within: A Framework for Understanding the Lifecycle of the Malicious Insider Threat to Information Systems
TA Robayo - 2022 - search.proquest.com
Malicious insider threats are a complex problem to information systems. The purpose of this
qualitative multi-case study was to investigate and present a framework to understand the …
qualitative multi-case study was to investigate and present a framework to understand the …
Novel approach for control data theft attack in cloud computing
KN Sastry, BT Rao… - International Journal of …, 2015 - search.proquest.com
Abstract Information security is a major problem faced by cloud computing around the world.
Because of their adverse effects on organizational information systems, viruses, hackers …
Because of their adverse effects on organizational information systems, viruses, hackers …
[PDF][PDF] A secured cloud data storage with access privileges
In proposed framework client source information reinforcements off-site to outsider
distributed storage benefits to decrease information administration costs. In any case, client …
distributed storage benefits to decrease information administration costs. In any case, client …
DC-MAABE: data centric multi-authority attribute based encryption on cloud storage
N Vurukonda, B Thirumala Rao - Journal of Computational and …, 2019 - ingentaconnect.com
In Recent technology advances in the cloud security enhancements creating an
environment to protect consumer sensitive data from the external entities. The ABE is a fine …
environment to protect consumer sensitive data from the external entities. The ABE is a fine …
[PDF][PDF] The Factors Affecting on Managing Sensitive Data in Cloud Computing
Cloud computing represents the most important shift in computing and information
technology (IT). However, security and privacy remain the main obstacles to its widespread …
technology (IT). However, security and privacy remain the main obstacles to its widespread …
A Study on IP Network Recovery through Routing Protocols
K Karthik, T Gunasekhar, D Meenu… - Indonesian Journal of …, 2016 - section.iaesonline.com
Internet has taken major role in our communication infrastructure. Such that requirement of
internet availability and reliability has increasing accordingly. The major network failure …
internet availability and reliability has increasing accordingly. The major network failure …
[PDF][PDF] A Review on Cloud Security Challenges and Issues
Abstract Background/Objectives: Cloud computing offers various services with minimum
management effort while provisioning resources via internet. Cloud clients are allowed to …
management effort while provisioning resources via internet. Cloud clients are allowed to …