This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abdullayeva, F. J. 2021. Advanced Persistent Threat attack detection method in cloud computing based on autoencoder and softmax regression algorithm. Array 10: 100067.AbdullayevaF. J.2021Advanced Persistent Threat attack detection method in cloud computing based on autoencoder and softmax regression algorithmArray1010006710.1016/j.array.2021.100067Search in Google Scholar
Aissaoui, K., Amane, M., Berrada, M. and Madani, M. A. 2022. A new framework to secure cloud based e-learning systems. In Bennani, S., Lakhrissi, Y., Khaissidi, G., Mansouri, A. and Khamlichi, Y. (Eds), WITS 2020. Springer, Singapore, pp. 65–75.AissaouiK.AmaneM.BerradaM.MadaniM. A.2022A new framework to secure cloud based e-learning systemsInBennaniS.LakhrissiY.KhaissidiG.MansouriA.KhamlichiY.(Eds),WITS 2020SpringerSingapore657510.1007/978-981-33-6893-4_7Search in Google Scholar
Alashhab, Z. R., Anbar, M., Singh, M. M., Leau, Y. B., Al-Sai, Z. A. and Alhayja’a, S. A. 2021. Impact of coronavirus pandemic crisis on technologies and cloud computing applications. Journal of Electronic Science and Technology 19(1): 100059.AlashhabZ. R.AnbarM.SinghM. M.LeauY. B.Al-SaiZ. A.Alhayja’aS. A.2021Impact of coronavirus pandemic crisis on technologies and cloud computing applicationsJournal of Electronic Science and Technology19110005910.1016/j.jnlest.2020.100059Search in Google Scholar
Babu, M. C. and Senthilkumar, K. 2021. Machine learning based strategies for secure cloud. Materials Today: Proceedings.BabuM. C.SenthilkumarK.2021Machine learning based strategies for secure cloudMaterials Today: ProceedingsSearch in Google Scholar
Bello, S. A., Oyedele, L. O., Akinade, O. O., Bilal, M., Delgado, J. M. D., Akanbi, L. A., Ajayi, A. O. and Owolabi, H. A. 2021. Cloud computing in construction industry: Use cases, benefits and challenges. Automation in Construction 122: 103441.BelloS. A.OyedeleL. O.AkinadeO. O.BilalM.DelgadoJ. M. D.AkanbiL. A.AjayiA. O.OwolabiH. A.2021Cloud computing in construction industry: Use cases, benefits and challengesAutomation in Construction12210344110.1016/j.autcon.2020.103441Search in Google Scholar
Chinnasamy, P., Padmavathi, S., Swathy, R. and Rakesh, S. 2021. Efficient data security using hybrid cryptography on cloud computing. In Ranganathan, G., Chen, J. and Rocha, Á. (Eds), Inventive Communication and Computational Technologies. Springer, Singapore, pp. 537–547.ChinnasamyP.PadmavathiS.SwathyR.RakeshS.2021Efficient data security using hybrid cryptography on cloud computingInRanganathanG.ChenJ.RochaÁ.(Eds),Inventive Communication and Computational TechnologiesSpringerSingapore53754710.1007/978-981-15-7345-3_46Search in Google Scholar
Hu, Q., Wu, F., Wong, R. K., Millham, R. C. and Fiaidhi, J. 2021. A novel indoor localization system using machine learning based on bluetooth low energy with cloud computing. Computing 2021: 1–27.HuQ.WuF.WongR. K.MillhamR. C.FiaidhiJ.2021A novel indoor localization system using machine learning based on bluetooth low energy with cloud computingComputing202112710.1007/s00607-020-00897-4Search in Google Scholar
Jayashri, N. and Kalaiselvi, K. 2021. Collaborative approaches for security of cloud and knowledge management systems: benefits and risks. In Bhardwaj, A. and Sapra, V. (Eds), Security Incidents & Response Against Cyber Attacks. Springer, Cham, pp. 57–64.JayashriN.KalaiselviK.2021Collaborative approaches for security of cloud and knowledge management systems: benefits and risksInBhardwajA.SapraV.(Eds),Security Incidents & Response Against Cyber AttacksSpringerCham576410.1007/978-3-030-69174-5_3Search in Google Scholar
Koushik, S. and Patil, A. P. 2022. Exploring live cloud migration on Amazon S3 instance using inter cloud framework. In Gandhi, T. K., Konar, D., Sen, B. and Sharma, K. (Eds), Advanced Computational Paradigms and Hybrid Intelligent Computing. Springer, Singapore, pp. 221–229.KoushikS.PatilA. P.2022Exploring live cloud migration on Amazon S3 instance using inter cloud frameworkInGandhiT. K.KonarD.SenB.SharmaK.(Eds),Advanced Computational Paradigms and Hybrid Intelligent ComputingSpringerSingapore22122910.1007/978-981-16-4369-9_23Search in Google Scholar
Kumar, L. and Kumar, P. 2021. Amazon EC2:(Elastic Compute Cloud) overview. In Singh Mer, K. K., Semwal, V. B., Bijalwan, V. and Crespo, R. G. (Eds), Proceedings of Integrated Intelligence Enable Networks and Computing. Springer, Singapore, pp. 543–552.KumarL.KumarP.2021Amazon EC2:(Elastic Compute Cloud) overviewInSingh MerK. K.SemwalV. B.BijalwanV.CrespoR. G.(Eds),Proceedings of Integrated Intelligence Enable Networks and ComputingSpringerSingapore54355210.1007/978-981-33-6307-6_54Search in Google Scholar
Mishra, P., Aggarwal, P., Vidyarthi, A., Singh, P., Khan, B., Alhelou, H. H. and Siano, P. 2021. VM Shield: Memory Introspection-based Malware Detection to Secure Cloud-based Services against Stealthy Attacks. IEEE Transactions on Industrial Informatics 17(10): 6754–6764.MishraP.AggarwalP.VidyarthiA.SinghP.KhanB.AlhelouH. H.SianoP.2021VM Shield: Memory Introspection-based Malware Detection to Secure Cloud-based Services against Stealthy AttacksIEEE Transactions on Industrial Informatics17106754676410.1109/TII.2020.3048791Search in Google Scholar
Mythili, S., Thiyagarajah, K., Rajesh, P. and Shajin, F. H. 2020. Ideal position and size selection of unified power flow controllers (UPFCs) to upgrade the dynamic stability of systems: an antlion optimiser and invasive weed optimisation algorithm. HKIE Trans 27(1): 25–37.MythiliS.ThiyagarajahK.RajeshP.ShajinF. H.2020Ideal position and size selection of unified power flow controllers (UPFCs) to upgrade the dynamic stability of systems: an antlion optimiser and invasive weed optimisation algorithmHKIE Trans271253710.33430/V27N1THIE-2018-0024Search in Google Scholar
Ogwel, B., Odhiambo-Otieno, G., Otieno, G., Abila, J. and Omore, R. 2021. Leveraging cloud computing for improved health service delivery: Findings from public health facilities in Kisumu County, Western Kenya-2019 Western Kenya: Learning Health Systems, pp. e10276.OgwelB.Odhiambo-OtienoG.OtienoG.AbilaJ.OmoreR.2021Leveraging cloud computing for improved health service delivery: Findings from public health facilities in Kisumu County, Western Kenya-2019Western Kenya: Learning Health Systemse1027610.1002/lrh2.10276875331835036553Search in Google Scholar
Rajesh, P. and Shajin, F. A. 2020. Multi-objective hybrid algorithm for planning electrical distribution system. European Journal of Electrical Engineering 22: 224–509.RajeshP.ShajinF. A.2020Multi-objective hybrid algorithm for planning electrical distribution systemEuropean Journal of Electrical Engineering2222450910.18280/ejee.224-509Search in Google Scholar
Shaikh, A. H. and Meshram, B. B. 2021. Security issues in cloud computing. In Balas, V. E., Semwal, V. B., Khandare, A. and Patil, M. (Eds), Intelligent Computing and Networking. Springer, Singapore, pp. 63–77.ShaikhA. H.MeshramB. B.2021Security issues in cloud computingInBalasV. E.SemwalV. B.KhandareA.PatilM.(Eds),Intelligent Computing and NetworkingSpringerSingapore637710.1007/978-981-15-7421-4_6Search in Google Scholar
Shajin, F. H. and Rajesh, P. 2020. Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol. International Journal of Pervasive Computing and Communications 1(1): 1.ShajinF. H.RajeshP.2020Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocolInternational Journal of Pervasive Computing and Communications11110.1108/IJPCC-09-2020-0136Search in Google Scholar
Su, Y., Li, Y., Yang, B. and Ding, Y. 2021. Decentralized self-auditing scheme with errors localization for multi-cloud storage. IEEE Transactions on Dependable and Secure Computing 1(1): 1.SuY.LiY.YangB.DingY.2021Decentralized self-auditing scheme with errors localization for multi-cloud storageIEEE Transactions on Dependable and Secure Computing11110.1109/TDSC.2021.3075984Search in Google Scholar
Thota, M. K., Shajin, F. H. and Rajesh, P. 2020. Survey on software defect prediction techniques. International Journal of Applied Science and Engineering. 17(4): 331–344.ThotaM. K.ShajinF. H.RajeshP.2020Survey on software defect prediction techniquesInternational Journal of Applied Science and Engineering.174331344Search in Google Scholar
Velliangiri, S., Karthikeyan, P. and Vinoth Kumar, V. 2021. Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks. Journal of Experimental & Theoretical Artificial Intelligence 33(3): 405–424.VelliangiriS.KarthikeyanP.Vinoth KumarV.2021Detection of distributed denial of service attack in cloud computing using the optimization-based deep networksJournal of Experimental & Theoretical Artificial Intelligence33340542410.1080/0952813X.2020.1744196Search in Google Scholar