À propos de cet article

Citez

Abdullayeva, F. J. 2021. Advanced Persistent Threat attack detection method in cloud computing based on autoencoder and softmax regression algorithm. Array 10: 100067. AbdullayevaF. J. 2021 Advanced Persistent Threat attack detection method in cloud computing based on autoencoder and softmax regression algorithm Array 10 100067 10.1016/j.array.2021.100067 Search in Google Scholar

Aissaoui, K., Amane, M., Berrada, M. and Madani, M. A. 2022. A new framework to secure cloud based e-learning systems. In Bennani, S., Lakhrissi, Y., Khaissidi, G., Mansouri, A. and Khamlichi, Y. (Eds), WITS 2020. Springer, Singapore, pp. 65–75. AissaouiK. AmaneM. BerradaM. MadaniM. A. 2022 A new framework to secure cloud based e-learning systems In BennaniS. LakhrissiY. KhaissidiG. MansouriA. KhamlichiY. (Eds), WITS 2020 Springer Singapore 65 75 10.1007/978-981-33-6893-4_7 Search in Google Scholar

Alashhab, Z. R., Anbar, M., Singh, M. M., Leau, Y. B., Al-Sai, Z. A. and Alhayja’a, S. A. 2021. Impact of coronavirus pandemic crisis on technologies and cloud computing applications. Journal of Electronic Science and Technology 19(1): 100059. AlashhabZ. R. AnbarM. SinghM. M. LeauY. B. Al-SaiZ. A. Alhayja’aS. A. 2021 Impact of coronavirus pandemic crisis on technologies and cloud computing applications Journal of Electronic Science and Technology 19 1 100059 10.1016/j.jnlest.2020.100059 Search in Google Scholar

Babu, M. C. and Senthilkumar, K. 2021. Machine learning based strategies for secure cloud. Materials Today: Proceedings. BabuM. C. SenthilkumarK. 2021 Machine learning based strategies for secure cloud Materials Today: Proceedings Search in Google Scholar

Bello, S. A., Oyedele, L. O., Akinade, O. O., Bilal, M., Delgado, J. M. D., Akanbi, L. A., Ajayi, A. O. and Owolabi, H. A. 2021. Cloud computing in construction industry: Use cases, benefits and challenges. Automation in Construction 122: 103441. BelloS. A. OyedeleL. O. AkinadeO. O. BilalM. DelgadoJ. M. D. AkanbiL. A. AjayiA. O. OwolabiH. A. 2021 Cloud computing in construction industry: Use cases, benefits and challenges Automation in Construction 122 103441 10.1016/j.autcon.2020.103441 Search in Google Scholar

Chinnasamy, P., Padmavathi, S., Swathy, R. and Rakesh, S. 2021. Efficient data security using hybrid cryptography on cloud computing. In Ranganathan, G., Chen, J. and Rocha, Á. (Eds), Inventive Communication and Computational Technologies. Springer, Singapore, pp. 537–547. ChinnasamyP. PadmavathiS. SwathyR. RakeshS. 2021 Efficient data security using hybrid cryptography on cloud computing In RanganathanG. ChenJ. RochaÁ. (Eds), Inventive Communication and Computational Technologies Springer Singapore 537 547 10.1007/978-981-15-7345-3_46 Search in Google Scholar

Hu, Q., Wu, F., Wong, R. K., Millham, R. C. and Fiaidhi, J. 2021. A novel indoor localization system using machine learning based on bluetooth low energy with cloud computing. Computing 2021: 1–27. HuQ. WuF. WongR. K. MillhamR. C. FiaidhiJ. 2021 A novel indoor localization system using machine learning based on bluetooth low energy with cloud computing Computing 2021 1 27 10.1007/s00607-020-00897-4 Search in Google Scholar

Jayashri, N. and Kalaiselvi, K. 2021. Collaborative approaches for security of cloud and knowledge management systems: benefits and risks. In Bhardwaj, A. and Sapra, V. (Eds), Security Incidents & Response Against Cyber Attacks. Springer, Cham, pp. 57–64. JayashriN. KalaiselviK. 2021 Collaborative approaches for security of cloud and knowledge management systems: benefits and risks In BhardwajA. SapraV. (Eds), Security Incidents & Response Against Cyber Attacks Springer Cham 57 64 10.1007/978-3-030-69174-5_3 Search in Google Scholar

Koushik, S. and Patil, A. P. 2022. Exploring live cloud migration on Amazon S3 instance using inter cloud framework. In Gandhi, T. K., Konar, D., Sen, B. and Sharma, K. (Eds), Advanced Computational Paradigms and Hybrid Intelligent Computing. Springer, Singapore, pp. 221–229. KoushikS. PatilA. P. 2022 Exploring live cloud migration on Amazon S3 instance using inter cloud framework In GandhiT. K. KonarD. SenB. SharmaK. (Eds), Advanced Computational Paradigms and Hybrid Intelligent Computing Springer Singapore 221 229 10.1007/978-981-16-4369-9_23 Search in Google Scholar

Kumar, L. and Kumar, P. 2021. Amazon EC2:(Elastic Compute Cloud) overview. In Singh Mer, K. K., Semwal, V. B., Bijalwan, V. and Crespo, R. G. (Eds), Proceedings of Integrated Intelligence Enable Networks and Computing. Springer, Singapore, pp. 543–552. KumarL. KumarP. 2021 Amazon EC2:(Elastic Compute Cloud) overview In Singh MerK. K. SemwalV. B. BijalwanV. CrespoR. G. (Eds), Proceedings of Integrated Intelligence Enable Networks and Computing Springer Singapore 543 552 10.1007/978-981-33-6307-6_54 Search in Google Scholar

Mishra, P., Aggarwal, P., Vidyarthi, A., Singh, P., Khan, B., Alhelou, H. H. and Siano, P. 2021. VM Shield: Memory Introspection-based Malware Detection to Secure Cloud-based Services against Stealthy Attacks. IEEE Transactions on Industrial Informatics 17(10): 6754–6764. MishraP. AggarwalP. VidyarthiA. SinghP. KhanB. AlhelouH. H. SianoP. 2021 VM Shield: Memory Introspection-based Malware Detection to Secure Cloud-based Services against Stealthy Attacks IEEE Transactions on Industrial Informatics 17 10 6754 6764 10.1109/TII.2020.3048791 Search in Google Scholar

Mythili, S., Thiyagarajah, K., Rajesh, P. and Shajin, F. H. 2020. Ideal position and size selection of unified power flow controllers (UPFCs) to upgrade the dynamic stability of systems: an antlion optimiser and invasive weed optimisation algorithm. HKIE Trans 27(1): 25–37. MythiliS. ThiyagarajahK. RajeshP. ShajinF. H. 2020 Ideal position and size selection of unified power flow controllers (UPFCs) to upgrade the dynamic stability of systems: an antlion optimiser and invasive weed optimisation algorithm HKIE Trans 27 1 25 37 10.33430/V27N1THIE-2018-0024 Search in Google Scholar

Ogwel, B., Odhiambo-Otieno, G., Otieno, G., Abila, J. and Omore, R. 2021. Leveraging cloud computing for improved health service delivery: Findings from public health facilities in Kisumu County, Western Kenya-2019 Western Kenya: Learning Health Systems, pp. e10276. OgwelB. Odhiambo-OtienoG. OtienoG. AbilaJ. OmoreR. 2021 Leveraging cloud computing for improved health service delivery: Findings from public health facilities in Kisumu County, Western Kenya-2019 Western Kenya: Learning Health Systems e10276 10.1002/lrh2.10276875331835036553 Search in Google Scholar

Rajesh, P. and Shajin, F. A. 2020. Multi-objective hybrid algorithm for planning electrical distribution system. European Journal of Electrical Engineering 22: 224–509. RajeshP. ShajinF. A. 2020 Multi-objective hybrid algorithm for planning electrical distribution system European Journal of Electrical Engineering 22 224 509 10.18280/ejee.224-509 Search in Google Scholar

Shaikh, A. H. and Meshram, B. B. 2021. Security issues in cloud computing. In Balas, V. E., Semwal, V. B., Khandare, A. and Patil, M. (Eds), Intelligent Computing and Networking. Springer, Singapore, pp. 63–77. ShaikhA. H. MeshramB. B. 2021 Security issues in cloud computing In BalasV. E. SemwalV. B. KhandareA. PatilM. (Eds), Intelligent Computing and Networking Springer Singapore 63 77 10.1007/978-981-15-7421-4_6 Search in Google Scholar

Shajin, F. H. and Rajesh, P. 2020. Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol. International Journal of Pervasive Computing and Communications 1(1): 1. ShajinF. H. RajeshP. 2020 Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol International Journal of Pervasive Computing and Communications 1 1 1 10.1108/IJPCC-09-2020-0136 Search in Google Scholar

Su, Y., Li, Y., Yang, B. and Ding, Y. 2021. Decentralized self-auditing scheme with errors localization for multi-cloud storage. IEEE Transactions on Dependable and Secure Computing 1(1): 1. SuY. LiY. YangB. DingY. 2021 Decentralized self-auditing scheme with errors localization for multi-cloud storage IEEE Transactions on Dependable and Secure Computing 1 1 1 10.1109/TDSC.2021.3075984 Search in Google Scholar

Thota, M. K., Shajin, F. H. and Rajesh, P. 2020. Survey on software defect prediction techniques. International Journal of Applied Science and Engineering. 17(4): 331–344. ThotaM. K. ShajinF. H. RajeshP. 2020 Survey on software defect prediction techniques International Journal of Applied Science and Engineering. 17 4 331 344 Search in Google Scholar

Velliangiri, S., Karthikeyan, P. and Vinoth Kumar, V. 2021. Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks. Journal of Experimental & Theoretical Artificial Intelligence 33(3): 405–424. VelliangiriS. KarthikeyanP. Vinoth KumarV. 2021 Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks Journal of Experimental & Theoretical Artificial Intelligence 33 3 405 424 10.1080/0952813X.2020.1744196 Search in Google Scholar

eISSN:
1178-5608
Langue:
Anglais
Périodicité:
Volume Open
Sujets de la revue:
Engineering, Introductions and Overviews, other