[PDF][PDF] Security enhancement in surveillance cloud using machine learning techniques
Most industries are now switching from traditional modes to cloud environments and cloud-
based services. It is essential to create a secure environment for the cloud space in order to …
based services. It is essential to create a secure environment for the cloud space in order to …
The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS
Reactive programming is a popular paradigm that has been used as a new solution in our
proposed model for security in the cloud. In this context, we have been able to reduce the …
proposed model for security in the cloud. In this context, we have been able to reduce the …
Usefulness of Honeypots Towards Data Security: A Systematic Literature Review
KE Silaen, M Meyliana, HLHS Warnars… - 2023 International …, 2023 - ieeexplore.ieee.org
The increasing data volume given by the exponential growth of digital devices, cloud
platforms, and the Internet of Things (IOT) had become an attractive target for attackers. This …
platforms, and the Internet of Things (IOT) had become an attractive target for attackers. This …
[PDF][PDF] The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS. Computers 2022, 11, 62
Reactive programming is a popular paradigm that has been used as a new solution in our
proposed model for security in the cloud. In this context, we have been able to reduce the …
proposed model for security in the cloud. In this context, we have been able to reduce the …
[PDF][PDF] Cloud Computing Security Issues, Vulnerabilities and Recommendations
Enterprises around the world implementing their cloud first strategy, but it often raises
questions about cloud computing and its security commitments. Cloud computing is the …
questions about cloud computing and its security commitments. Cloud computing is the …
Mitigating the Damage of Ransomware Incidents.
DA Ahmad, N Zahadat - ISSA Journal, 2022 - search.ebscohost.com
In 2022, we have seen a rapid increase in the need for additional cybersecurity measures
such as cloud technologies and cloud security in the United States in order to further protect …
such as cloud technologies and cloud security in the United States in order to further protect …