Uneingeschränkter Zugang

Research on university laboratory network security based on Cloud Computing

   | 02. Juni 2023

Zitieren

Tak, A., Mhdo, B., Ghh, C., et al. (2022). Unlocking digital technologies for waste recycling in industry 4.0 era: A transformation towards a digitalization-based circular economy in Indonesia. Journal of Cleaner Production. Search in Google Scholar

Frantz, D., Hostert, P., Rufin, P., et al. (2022). Revisiting the Past: Replicability of a Historic Long-Term Vegetation Dynamics Assessment in the Era of Big Data Analytics. Remote Sensing, 14(3), 597. Search in Google Scholar

Li, J., Qiao, Z., Zhang, K., et al. (2021). A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing. Sensors, 21(1), 288. Search in Google Scholar

Liu, Y., Ren, L. (2022). The Influence of Artificial Intelligence Technology on Teaching under the Threshold of “Internet+”: Based on the Application Example of an English Education Platform. Wireless Communications and Mobile Computing. Search in Google Scholar

Sharma, A., Kaur, S., Singh, M. A. (2021). Comprehensive review on blockchain and Internet of Things in healthcare. Transactions on Emerging Telecommunications Technologies. Search in Google Scholar

Thunibat, A. A., Sawad, M. B., Almaiah, M. A., et al. (2021). Sustainable Applications of Smart-Government Services: A Model to Understand Smart-Government Adoption. Sustainability, 13. Search in Google Scholar

Wu, S., Zhang, J. (2021). Research on a Compound Dual Innovation Capability Model of Intelligent Manufacturing Enterprises. Sustainability, 13. Search in Google Scholar

Dziubinski, K., Bandai, M. (2021). Bandwidth Efficient IoT Traffic Shaping Technique for Protecting Smart Home Privacy from Data Breaches in Wireless LAN. IEICE Transactions on Communications. Search in Google Scholar

Wu, H., Hao, Y., Ren, S., et al. (2021). Does internet development improve green total factor energy efficiency? Evidence from China. Energy Policy, 112247. Search in Google Scholar

Malik, A. T., Phillips, F. M., Kim, J., et al. (2020). P111. Undergoing elective posterior lumbar fusions at “US News & World Report” ranked hospitals versus non-ranked hospitals: do rankings even matter?. The Spine Journal, 20(9), S199. Search in Google Scholar

Reisgen, U., Mann, S., Sharma, R. (2020). GMAW in the Internet of Production. Welding Journal, 99(11), 38-42. Search in Google Scholar

Wei, L. A., Zn, B., Sx, A., et al. (2021). Secure Fusion Approach for the Internet of Things in Smart Autonomous Multi-Robot Systems. Information Sciences. Search in Google Scholar

Chen, Z., Wang, H. (2022). Research on Audit Simulation of Accounting Computerization Based on Internet Complex Discrete Dynamic Modeling Technology. Mathematical Problems in Engineering. Search in Google Scholar

Anand, P., Singh, Y., Selwal, A., et al. (2020). IoVT: Internet of Vulnerable Things? Threat Architecture, Attack Surfaces, and Vulnerabilities in Internet of Things and Its Applications towards Smart Grids. Energies, 13. Search in Google Scholar

Fj, A., Mc, A., Wz, A., et al. (2021). Intrusion Detection on Internet of Vehicles via Combining Log-ratio Oversampling, Outlier Detection and Metric Learning. Information Sciences. Search in Google Scholar

Abbas, S. G., Vaccari, I., Hussain, F., et al. (2021). Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach. Sensors, 21 (Internet of Things for Smart Homes and Industrial Application). Search in Google Scholar

Jia, C., Ma, J., Liu, Q., et al. (2020). Linkboost: A Link Prediction Algorithm to Solve the Problem of Network Vulnerability in Cases Involving Incomplete Information. Complexity, 3, 1-14. Search in Google Scholar

Khan, A. M., Iqbal, N., Khan, A. A., et al. (2020). Detection of Intermediate Spoofing Attack on GNSS Receiver through Slope based Metrics. Journal of Navigation. Search in Google Scholar

Jiang, C.. (2022). Network security and ideological security based on wireless communication and big data analysis. Wireless Communications and Mobile Computing, 2022(3), 1-6. Search in Google Scholar

Mazurczyk, W., Bisson, P., Jover, R. P., et al. (2020). Challenges and Novel Solutions for 5G Network Security, Privacy and Trust. IEEE Wireless Communications, 27(4), 6-7. Search in Google Scholar

Zhang, H., Meng, X., Zhang, X., et al. (2020). CANsec: A Practical in-Vehicle Controller Area Network Security Evaluation Tool. Sensors, 20(17), 4900. Search in Google Scholar

Zhao, D., Song, H., Li, H. (2021). Fuzzy integrated rough set theory situation feature extraction of network security. Journal of Intelligent and Fuzzy Systems, 40(1), 1-12. Search in Google Scholar

Vajjha, H., Sushma, P. (2021). Techniques and Limitations in Securing the Log Files to Enhance Network Security and Monitoring. Solid State Technology, 64(2), 1-8. Search in Google Scholar

Imran, M., Bashir, F., Jafri, A., et al. (2021). A Systematic Review of Scalable Hardware Architectures for Pattern Matching in Network Security. Computers & Electrical Engineering, Pre-press(Pre-press):Pre-press. Search in Google Scholar

Zhang, R., Hu, Z. (2021). Access control method of network security authentication information based on fuzzy reasoning algorithm. Measurement, 185:110103. Search in Google Scholar

Togay, C., Kasif, A., Catal, C., et al. (2021). A Firewall Policy Anomaly Detection Framework for Reliable Network Security. IEEE Transactions on Reliability, 99, 1-9. Search in Google Scholar

Kang, Y., Zhong, J., Li, R., et al. (2021). Classification Method for Network Security Data Based on Multi-featured Extraction. International Journal on Artificial Intelligence Tools. Search in Google Scholar

Bhuiyan, T. H., Medal, H. R., Nandi, A. K., et al. (2021). Risk-averse bi-level stochastic network interdiction model for cyber-security risk management. International Journal of Critical Infrastructure Protection, 32. Search in Google Scholar

Benomar, Z., Longo, F., Merlino, G., et al. (2021). Cloud-based Network Virtualization in IoT with Open Stack. ACM Transactions on Internet Technology (TOIT). Search in Google Scholar

Henes, F. O., Stappenbeck, P., Tahir, E., et al. (2020). Implementation of a 24-Hour Teleradiology Service for Cruise Ships: A Pilot Study. American Journal of Roentgenology, 214(4), 1-7. Search in Google Scholar

Alghazzawi, D. M., Badri, S. (2022). Using the B/S Model to Design and Implement Online Shopping System for Gulf Brands. Sustainability, 14. Search in Google Scholar

Mun, H., Han, K., Dong, H. L. (2020). Ensuring Safety and Security in CAN-based Automotive Embedded Systems: A Combination of Design Optimization and Secure Communication. IEEE Transactions on Vehicular Technology, 99, 1-1. Search in Google Scholar

eISSN:
2444-8656
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
Volume Open
Fachgebiete der Zeitschrift:
Biologie, andere, Mathematik, Angewandte Mathematik, Allgemeines, Physik