[PDF][PDF] Security enhancement in surveillance cloud using machine learning techniques

LR Kumar, C Ashokkumar, PS Pandey… - International Journal on …, 2023 - core.ac.uk
Most industries are now switching from traditional modes to cloud environments and cloud-
based services. It is essential to create a secure environment for the cloud space in order to …

The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS

D Hyseni, N Piraj, B Çiço, I Shabani - Computers, 2022 - mdpi.com
Reactive programming is a popular paradigm that has been used as a new solution in our
proposed model for security in the cloud. In this context, we have been able to reduce the …

Usefulness of Honeypots Towards Data Security: A Systematic Literature Review

KE Silaen, M Meyliana, HLHS Warnars… - 2023 International …, 2023 - ieeexplore.ieee.org
The increasing data volume given by the exponential growth of digital devices, cloud
platforms, and the Internet of Things (IOT) had become an attractive target for attackers. This …

[PDF][PDF] The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS. Computers 2022, 11, 62

D Hyseni, N Piraj, B Çiço, I Shabani - 2022 - academia.edu
Reactive programming is a popular paradigm that has been used as a new solution in our
proposed model for security in the cloud. In this context, we have been able to reduce the …

[PDF][PDF] Cloud Computing Security Issues, Vulnerabilities and Recommendations

B Dash, P Sharma, S Ullah - researchgate.net
Enterprises around the world implementing their cloud first strategy, but it often raises
questions about cloud computing and its security commitments. Cloud computing is the …

Mitigating the Damage of Ransomware Incidents.

DA Ahmad, N Zahadat - ISSA Journal, 2022 - search.ebscohost.com
In 2022, we have seen a rapid increase in the need for additional cybersecurity measures
such as cloud technologies and cloud security in the United States in order to further protect …