A review of deep learning security and privacy defensive techniques
In recent past years, Deep Learning presented an excellent performance in different areas
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …
Security, integrity, and privacy of cloud computing and big data
MS Mushtaq, MY Mushtaq, MW Iqbal… - Security and privacy …, 2022 - taylorfrancis.com
Big data is crucial in the modern world because more datasets are falling in its domain. The
term refers to the enormously growing complex heterogeneous datasets requiring powerful …
term refers to the enormously growing complex heterogeneous datasets requiring powerful …
Combination of AHP and TOPSIS methods for the ranking of information security controls to overcome its obstructions under fuzzy environment
MI Tariq, S Tayyaba, N Ali Mian… - Journal of Intelligent …, 2020 - content.iospress.com
The organizations utilizing the cloud computing services are required to select suitable
Information Security Controls (ISCs) to maintain data security and privacy. Many …
Information Security Controls (ISCs) to maintain data security and privacy. Many …
A learners experience with the games education in software engineering
MI Tariq, J Diaz-Martinez, SA Butt, M Adeel… - … : Proceedings of the 8th …, 2021 - Springer
The utilization of games and its components in software building training isn't new. In reality,
their usage in Software development training is found to look into papers for numerous …
their usage in Software development training is found to look into papers for numerous …
[图书][B] Security and Privacy Trends in Cloud Computing and Big Data
It is essential for an organization to know before involving themselves in cloud computing
and big data, what are the key security requirements for applications and data processing …
and big data, what are the key security requirements for applications and data processing …
Cloud computing security challenges and their solutions
Cloud computing is an internet-based technology that is becoming an emerging trend. It
provides on-demand cloud-based services. Although it has many advantages, cloud …
provides on-demand cloud-based services. Although it has many advantages, cloud …
Information security framework for cloud and virtualization security
In recent years, researchers have struggled to build a utility computing model. Cloud
computing enables the delivery of information technology on demand. Many organizations …
computing enables the delivery of information technology on demand. Many organizations …
Artificial Intelligence Working to Secure Small Enterprises
K Rasmus - Artificial Intelligence for Security: Enhancing Protection …, 2024 - Springer
Cyber security threats affecting small enterprises are similar to those of larger enterprises.
Small enterprises are also under the same cyber security requirements and regulations as …
Small enterprises are also under the same cyber security requirements and regulations as …
Performance enhancement of IoMT using artificial intelligence algorithms
MS Mushtaq, Y Mushtaq, MQ Raza… - Security and Privacy Issues …, 2023 - Elsevier
This chapter presents a comprehensive review of the application of IoMT in the health-care
domain with a focus on artificial intelligence. It discusses the various aspects of AI …
domain with a focus on artificial intelligence. It discusses the various aspects of AI …
Future challenges of IOMT applications
MJ Ahsan - Security and Privacy Issues in Internet of Medical …, 2023 - Elsevier
The Internet of medical things (IoMT) is a new technology that aims to improve patient quality
of life by enabling personalized e-health services that are not constrained by place or time …
of life by enabling personalized e-health services that are not constrained by place or time …