A review of deep learning security and privacy defensive techniques

MI Tariq, NA Memon, S Ahmed… - Mobile Information …, 2020 - Wiley Online Library
In recent past years, Deep Learning presented an excellent performance in different areas
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …

Security, integrity, and privacy of cloud computing and big data

MS Mushtaq, MY Mushtaq, MW Iqbal… - Security and privacy …, 2022 - taylorfrancis.com
Big data is crucial in the modern world because more datasets are falling in its domain. The
term refers to the enormously growing complex heterogeneous datasets requiring powerful …

Combination of AHP and TOPSIS methods for the ranking of information security controls to overcome its obstructions under fuzzy environment

MI Tariq, S Tayyaba, N Ali Mian… - Journal of Intelligent …, 2020 - content.iospress.com
The organizations utilizing the cloud computing services are required to select suitable
Information Security Controls (ISCs) to maintain data security and privacy. Many …

A learners experience with the games education in software engineering

MI Tariq, J Diaz-Martinez, SA Butt, M Adeel… - … : Proceedings of the 8th …, 2021 - Springer
The utilization of games and its components in software building training isn't new. In reality,
their usage in Software development training is found to look into papers for numerous …

[图书][B] Security and Privacy Trends in Cloud Computing and Big Data

MI Tariq, VE Balas, S Tayyaba - 2022 - books.google.com
It is essential for an organization to know before involving themselves in cloud computing
and big data, what are the key security requirements for applications and data processing …

Cloud computing security challenges and their solutions

R Khalid, K Khaliq, MI Tariq, S Tayyaba… - Security and Privacy …, 2022 - taylorfrancis.com
Cloud computing is an internet-based technology that is becoming an emerging trend. It
provides on-demand cloud-based services. Although it has many advantages, cloud …

Information security framework for cloud and virtualization security

MI Tariq, S Tayyaba, MA Jaffar, MW Ashraf… - Security and Privacy …, 2022 - taylorfrancis.com
In recent years, researchers have struggled to build a utility computing model. Cloud
computing enables the delivery of information technology on demand. Many organizations …

Artificial Intelligence Working to Secure Small Enterprises

K Rasmus - Artificial Intelligence for Security: Enhancing Protection …, 2024 - Springer
Cyber security threats affecting small enterprises are similar to those of larger enterprises.
Small enterprises are also under the same cyber security requirements and regulations as …

Performance enhancement of IoMT using artificial intelligence algorithms

MS Mushtaq, Y Mushtaq, MQ Raza… - Security and Privacy Issues …, 2023 - Elsevier
This chapter presents a comprehensive review of the application of IoMT in the health-care
domain with a focus on artificial intelligence. It discusses the various aspects of AI …

Future challenges of IOMT applications

MJ Ahsan - Security and Privacy Issues in Internet of Medical …, 2023 - Elsevier
The Internet of medical things (IoMT) is a new technology that aims to improve patient quality
of life by enabling personalized e-health services that are not constrained by place or time …