An analysis of cloud security frameworks, problems and proposed solutions
M Chauhan, S Shiaeles - Network, 2023 - mdpi.com
The rapidly growing use of cloud computing raises security concerns. This study paper
seeks to examine cloud security frameworks, addressing cloud-associated issues and …
seeks to examine cloud security frameworks, addressing cloud-associated issues and …
A security framework for secure cloud computing environments
Cloud computing technology is a relatively new concept of providing scalable and
virtualized resources, software and hardware on demand to consumers. It presents a new …
virtualized resources, software and hardware on demand to consumers. It presents a new …
A review paper on hypervisor and virtual machine security
A hypervisor is a computer programme or software that facilitates to create and run multiple
virtual machines. It is also known as Virtual Machine Manager (VMM). Due to their …
virtual machines. It is also known as Virtual Machine Manager (VMM). Due to their …
Conceptualising a cloud business intelligence security evaluation framework for small and medium enterprises in small towns of the Limpopo Province, South Africa
M Moyo, M Loock - Information, 2021 - mdpi.com
The purpose of this study was to investigate security evaluation practices among small and
medium enterprises (SMEs) in small South African towns when adopting cloud business …
medium enterprises (SMEs) in small South African towns when adopting cloud business …
Knowledge-driven analytics and systems impacting human quality of life-neurosymbolic ai, explainable ai and beyond
The management of knowledge-driven artificial intelligence technologies is essential in
order to evaluate their impact on human life and society. Social networks and tech use can …
order to evaluate their impact on human life and society. Social networks and tech use can …
Securing cloud hypervisors: a survey of the threats, vulnerabilities, and countermeasures
JP Barrowclough, R Asif - Security and Communication …, 2018 - Wiley Online Library
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns,
taking into account the fact that the resources are shared and mediated by a 'hypervisor'that …
taking into account the fact that the resources are shared and mediated by a 'hypervisor'that …
Event and activity recognition in video surveillance for cyber-physical systems
S Bhaumik, P Jana, PP Mohanta - … of Cyber Physical System and IoT in …, 2021 - Springer
In this chapter, we aim to aid the development of Cyber-Physical Systems (CPS) in
automated understanding of events and activities in various applications of video …
automated understanding of events and activities in various applications of video …
Automated cardiac health screening using smartphone and wearable sensors through anomaly analytics
A Ukil, S Bandyopadhyay - Mobile Solutions and Their Usefulness in …, 2019 - Springer
With the advent and rapid deployment of Internet of Things (IoT), artificial intelligence (AI),
powerful smartphones, and wearable sensor devices (eg, smartwatch), we are entering into …
powerful smartphones, and wearable sensor devices (eg, smartwatch), we are entering into …
[图书][B] The e-government development discourse: analysing contemporary and future growth prospects in developing and emerging economies
KJ Bwalya - 2018 - library.oapen.org
research agenda for e-Government. When e-Government was first conceived, it was
designed upon basic technologies where the emphasis was only on the simple display of …
designed upon basic technologies where the emphasis was only on the simple display of …
[PDF][PDF] Impact of Cloud Computing Services and Application in Healthcare Sector and to provide improved quality patient care
MSR Arora, S Gera, M Saxena - IEEE Int. Conf. Cloud Comput …, 2021 - researchgate.net
The objective of the study is to explain how cloud based methods, services and applications
can help healthcare service provider to improved quality care. And how issues (Security …
can help healthcare service provider to improved quality care. And how issues (Security …