A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …
addressing security challenges in cloud computing environments. It highlights the …
Retracted: Object detection and recognition using deep learning‐based techniques
The above article from IET Communications, published online on 17 October 2022 in Wiley
Online Library (wileyonlinelibrary. com), has been retracted by agreement between the …
Online Library (wileyonlinelibrary. com), has been retracted by agreement between the …
Adaptive cloud intrusion detection system based on pruned exact linear time technique
W Elbakri, MM Siraj, BAS Al-Rimy… - Computers, Materials …, 2024 - irep.ntu.ac.uk
Cloud computing environments, characterized by dynamic scaling, distributed architectures,
and complex workloads, are increasingly targeted by malicious actors. These threats …
and complex workloads, are increasingly targeted by malicious actors. These threats …
Harnessing Machine Learning for Effective Cyber security Classifiers
T Jena, A Shankar, A Singhdeo - Asian Journal of …, 2023 - research.send4journal.com
Machine learning has emerged as a transformative force, innovating diverse industries
through its capacity to infuse meaningful insights from large datasets. It plays a pivotal role in …
through its capacity to infuse meaningful insights from large datasets. It plays a pivotal role in …
A Comparative Study of Intrusion Detection and Prevention Systems for Cloud Environment
K Shanthi, R Maruthi - 2023 4th International Conference on …, 2023 - ieeexplore.ieee.org
Cloud Computing is an emerging technology for developing, deploying and accessing any
applications and data. An Intrusion Detection System and Prevention Systems (IDPS) …
applications and data. An Intrusion Detection System and Prevention Systems (IDPS) …
A Multiple Linear Regression Model for Crop Production using Machine Learning and Neural Network
R Singh, R Deorari - 2022 IEEE 2nd Mysore Sub Section …, 2022 - ieeexplore.ieee.org
Wireless sensors and artificial intelligence (AI)-based monitoring systems are in great
demand and provide precise data extraction and analysis. Finding the best plant …
demand and provide precise data extraction and analysis. Finding the best plant …
Authentication tokens based smart backup and recovery system for modern android systems
SK Mand, N Sharma - 2022 International Interdisciplinary …, 2022 - ieeexplore.ieee.org
After rooting a Smartphone, the average user starts experimenting with the device and
installing various interface tweaks, themes, fonts, new kernels, firmware, radio and root …
installing various interface tweaks, themes, fonts, new kernels, firmware, radio and root …
[PDF][PDF] A Novel Energy Aware Clustering Mechanism with Fuzzy Logic in MANET Environment
CR Prasad, VA Vuyyuru, T Sushma… - International Journal on …, 2022 - core.ac.uk
Abstract A Mobile Ad Hoc Networks (MANETs) comprises of the vast range of devices such
as sensors, smart phones, laptops and other mobile devices that connect with each other …
as sensors, smart phones, laptops and other mobile devices that connect with each other …
An innovation development of smart data protection mechanisms and its related parameters in financial institutions
MK Sharma - 2022 International Interdisciplinary …, 2022 - ieeexplore.ieee.org
Confidential information is of great interest to competing firms. This causes aggression with
attacks. Many problems underestimate the importance of the threat, and as a result, it can …
attacks. Many problems underestimate the importance of the threat, and as a result, it can …
Automatic Translation of English Terms for Computer Network Security Based on Deep Learning
X Zhou, W Jia, C Shi - Journal of Electrical Systems, 2024 - search.proquest.com
Translation computer network security refers to the protection of sensitive information during
the transmission of data across networks in different languages. With the increasing …
the transmission of data across networks in different languages. With the increasing …