A review of deep learning security and privacy defensive techniques

MI Tariq, NA Memon, S Ahmed… - Mobile Information …, 2020 - Wiley Online Library
In recent past years, Deep Learning presented an excellent performance in different areas
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …

Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks

MI Tariq, S Ahmed, NA Memon, S Tayyaba, MW Ashraf… - Sensors, 2020 - mdpi.com
With the advent of cloud computing and wireless sensor networks, the number of
cyberattacks has rapidly increased. Therefore, the proportionate security of networks has …

Evaluation of the challenges in the internet of medical things with multicriteria decision making (AHP and TOPSIS) to overcome its obstruction under fuzzy environment

MI Tariq, NA Mian, A Sohail, T Alyas… - Mobile Information …, 2020 - Wiley Online Library
The exponential speed of advancement of innovation has expanded the needs of all users
to avail all their information on the Internet 24/7. The Internet of things (IoT) enables smart …

Security, integrity, and privacy of cloud computing and big data

MS Mushtaq, MY Mushtaq, MW Iqbal… - Security and privacy …, 2022 - taylorfrancis.com
Big data is crucial in the modern world because more datasets are falling in its domain. The
term refers to the enormously growing complex heterogeneous datasets requiring powerful …

An analysis of the application of fuzzy logic in cloud computing

MI Tariq, S Tayyaba, N Ali Mian… - Journal of Intelligent …, 2020 - content.iospress.com
Fuzzy logic has wide adoption in every field of study due to its immense advantages and
techniques. In cloud computing, there are many challenges that can be resolved with the …

Artificial intelligence in medicine

M Malik, MI Tariq, M Kamran, MR Naqvi - … on VTCA, 15–18 October 2019 …, 2021 - Springer
Artificial Intelligence (AI) is the field of computer science that works on the development of
intelligent machines that can perform tasks like humans. This human-made brainpower …

Towards a new taxonomy of insider threats

S Chaipa, EK Ngassam… - 2022 IST-Africa …, 2022 - ieeexplore.ieee.org
This paper discusses the outcome of combining insider threat agent taxonomies with the aim
of enhancing insider threat detection. The objectives sought to explore taxonomy …

[图书][B] Security and Privacy Trends in Cloud Computing and Big Data

MI Tariq, VE Balas, S Tayyaba - 2022 - books.google.com
It is essential for an organization to know before involving themselves in cloud computing
and big data, what are the key security requirements for applications and data processing …

Cloud computing security challenges and their solutions

R Khalid, K Khaliq, MI Tariq, S Tayyaba… - Security and Privacy …, 2022 - taylorfrancis.com
Cloud computing is an internet-based technology that is becoming an emerging trend. It
provides on-demand cloud-based services. Although it has many advantages, cloud …

Impact of big data in healthcare and management analysis

SA Haafza, MS Dar, MI Tariq, MA Jaffar… - Security and Privacy …, 2022 - taylorfrancis.com
Big Data is a massive amount of information that can work wonders. For about the last two
decades, it has now become a topic of significant fascination because of its enormous …