Fog computing security: a review of current applications and security solutions
S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …
computing resources on the edges of a network. It can be described as a cloud-like platform …
Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks
The recent advancements in cyber technology have facilitated the global electronic sharing
of healthcare data among various healthcare professionals, including clinicians …
of healthcare data among various healthcare professionals, including clinicians …
Intrusion and ransomware detection system
A El-Kosairy, MA Azer - 2018 1st international conference on …, 2018 - ieeexplore.ieee.org
Attackers and cybercriminals are always in a race to either compromise networks and
servers or embezzle ransoms through ransomware. Intruders must be prevented from such …
servers or embezzle ransoms through ransomware. Intruders must be prevented from such …
Deception as a service: intrusion and ransomware detection system for cloud computing (IRDS4C)
A El-Kosairy, N Abdelbaki - Advances in Computational Intelligence, 2023 - Springer
Cloud computing technology is growing fast. It offers end-users flexibility, ease of use, agility,
and more at a low cost. This expands the attack surface and factors, resulting in more …
and more at a low cost. This expands the attack surface and factors, resulting in more …
Detecting adversarial attacks through decoy training
Decoy data is generated from regular data. A deep neural network, which has been trained
with the regular data, is trained with the decoy data. The trained deep neural network …
with the regular data, is trained with the decoy data. The trained deep neural network …
Fog-assisted data security and privacy in healthcare
With the advancement in the aging of world's population and increments of people having
chronic diseases, resulted in high demand for expensive medical treatment and care. In this …
chronic diseases, resulted in high demand for expensive medical treatment and care. In this …
Green Computing in Network Security
N Sumalatha, K Baskaran - Artificial Intelligence Techniques …, 2024 - api.taylorfrancis.com
Green computing seeks to decrease the use of hazardous materials, maximize energy
efficiency throughout a product's lifetime, and increase the recycling or biodegradability of …
efficiency throughout a product's lifetime, and increase the recycling or biodegradability of …
[PDF][PDF] Approach for Secure Authorized Deduplication using Hybrid Cloud
MBA Malar, ML Shri, M Deepa… - International Journal of …, 2016 - researchgate.net
Now a days Data deduplication is one of important data compression techniques for
eliminating duplicate copies of repeating data, and has been widely used in cloud storage to …
eliminating duplicate copies of repeating data, and has been widely used in cloud storage to …
[PDF][PDF] Contemporary Applications of Fog Computing along with Security Problems and Solutions
Fog computing could be a new paradigm that extends the Cloud platform model by
providing computing resources on the sides of a network. It is represented as a cloud-like …
providing computing resources on the sides of a network. It is represented as a cloud-like …
Detecting adversarial attacks through decoy training
Decoy data is generated from regular data. A deep neural network, which has been trained
with the regular data, is trained with the decoy data. The trained deep neural network …
with the regular data, is trained with the decoy data. The trained deep neural network …