A systematic literature review on cloud computing security: threats and mitigation strategies

B Alouffi, M Hasnain, A Alharbi, W Alosaimi… - Ieee …, 2021 - ieeexplore.ieee.org
Cloud computing has become a widely exploited research area in academia and industry.
Cloud computing benefits both cloud services providers (CSPs) and consumers. The …

[HTML][HTML] A review of machine learning algorithms for cloud computing security

UA Butt, M Mehmood, SBH Shah, R Amin, MW Shaukat… - Electronics, 2020 - mdpi.com
Cloud computing (CC) is on-demand accessibility of network resources, especially data
storage and processing power, without special and direct management by the users. CC …

Smartblock-sdn: An optimized blockchain-sdn framework for resource management in iot

A Rahman, MJ Islam, A Montieri, MK Nasir… - IEEE …, 2021 - ieeexplore.ieee.org
Software-Defined Networking (SDN) and Blockchain are leading technologies used
worldwide to establish safe network communication as well as build secure network …

Investigating photovoltaic solar power output forecasting using machine learning algorithms

Y Essam, AN Ahmed, R Ramli, KW Chau… - Engineering …, 2022 - Taylor & Francis
Solar power integration in electrical grids is complicated due to dependence on volatile
weather conditions. To address this issue, continuous research and development is required …

[HTML][HTML] Voxelated opto-physically unclonable functions via irreplicable wrinkles

K Kim, SU Kim, MY Choi, MH Saeed, Y Kim… - Light: Science & …, 2023 - nature.com
The increased prevalence of the Internet of Things (IoT) and the integration of digital
technology into our daily lives have given rise to heightened security risks and the need for …

Fog computing advancement: Concept, architecture, applications, advantages, and open issues

TAN Abdali, R Hassan, AHM Aman, QN Nguyen - IEEE Access, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is proliferating in our real world, and it is a promising technology that
serves a very comfortable service to the users. IoT's underlying technology is to connect to …

An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique

M Mayuranathan, SK Saravanan, B Muthusenthil… - … in Engineering Software, 2022 - Elsevier
Users have been urged to embrace a cloud-based environment by recent technologies and
advancements. Because of the dispersed nature of cloud solutions, security is a major …

[HTML][HTML] On the integration of blockchain and sdn: Overview, applications, and future perspectives

A Rahman, A Montieri, D Kundu, MR Karim… - Journal of Network and …, 2022 - Springer
Blockchain (BC) and software-defined networking (SDN) are leading technologies which
have recently found applications in several network-related scenarios and have …

[PDF][PDF] Data augmentation based malware detection using convolutional neural networks

FO Catak, J Ahmed, K Sahinbas, ZH Khand - Peerj computer science, 2021 - peerj.com
Due to advancements in malware competencies, cyber-attacks have been broadly observed
in the digital world. Cyber-attacks can hit an organization hard by causing several damages …

[HTML][HTML] A case study of petrophysical rock typing and permeability prediction using machine learning in a heterogenous carbonate reservoir in Iran

E Mohammadian, M Kheirollahi, B Liu… - Scientific reports, 2022 - nature.com
Petrophysical rock typing (PRT) and permeability prediction are of great significance for
various disciplines of oil and gas industry. This study offers a novel, explainable data-driven …