A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities

KS Gill, A Sharma, S Saxena - Archives of Computational Methods in …, 2024 - Springer
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …

Retracted: Object detection and recognition using deep learning‐based techniques

P Sharma, S Gupta, S Vyas, M Shabaz - IET Communications, 2023 - Wiley Online Library
The above article from IET Communications, published online on 17 October 2022 in Wiley
Online Library (wileyonlinelibrary. com), has been retracted by agreement between the …

Adaptive cloud intrusion detection system based on pruned exact linear time technique

W Elbakri, MM Siraj, BAS Al-Rimy… - Computers, Materials …, 2024 - irep.ntu.ac.uk
Cloud computing environments, characterized by dynamic scaling, distributed architectures,
and complex workloads, are increasingly targeted by malicious actors. These threats …

Harnessing Machine Learning for Effective Cyber security Classifiers

T Jena, A Shankar, A Singhdeo - Asian Journal of …, 2023 - research.send4journal.com
Machine learning has emerged as a transformative force, innovating diverse industries
through its capacity to infuse meaningful insights from large datasets. It plays a pivotal role in …

A Comparative Study of Intrusion Detection and Prevention Systems for Cloud Environment

K Shanthi, R Maruthi - 2023 4th International Conference on …, 2023 - ieeexplore.ieee.org
Cloud Computing is an emerging technology for developing, deploying and accessing any
applications and data. An Intrusion Detection System and Prevention Systems (IDPS) …

A Multiple Linear Regression Model for Crop Production using Machine Learning and Neural Network

R Singh, R Deorari - 2022 IEEE 2nd Mysore Sub Section …, 2022 - ieeexplore.ieee.org
Wireless sensors and artificial intelligence (AI)-based monitoring systems are in great
demand and provide precise data extraction and analysis. Finding the best plant …

Authentication tokens based smart backup and recovery system for modern android systems

SK Mand, N Sharma - 2022 International Interdisciplinary …, 2022 - ieeexplore.ieee.org
After rooting a Smartphone, the average user starts experimenting with the device and
installing various interface tweaks, themes, fonts, new kernels, firmware, radio and root …

[PDF][PDF] A Novel Energy Aware Clustering Mechanism with Fuzzy Logic in MANET Environment

CR Prasad, VA Vuyyuru, T Sushma… - International Journal on …, 2022 - core.ac.uk
Abstract A Mobile Ad Hoc Networks (MANETs) comprises of the vast range of devices such
as sensors, smart phones, laptops and other mobile devices that connect with each other …

An innovation development of smart data protection mechanisms and its related parameters in financial institutions

MK Sharma - 2022 International Interdisciplinary …, 2022 - ieeexplore.ieee.org
Confidential information is of great interest to competing firms. This causes aggression with
attacks. Many problems underestimate the importance of the threat, and as a result, it can …

Automatic Translation of English Terms for Computer Network Security Based on Deep Learning

X Zhou, W Jia, C Shi - Journal of Electrical Systems, 2024 - search.proquest.com
Translation computer network security refers to the protection of sensitive information during
the transmission of data across networks in different languages. With the increasing …