Indices
This title is listed in the following:
Close
Reference Hub
This research has been cited in:
Conference
Security Analysis of AWS-based Video Surveillance Systems2021 International Conference on Engineering and Emerging Technologies (ICEET)10.1109/ICEET53442.2021.9659574 Conference
General Chaos Implementation as a Construction Element of Primitive Cryptography2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)10.1109/IAICT59002.2023.10205692 Chapter
Critical Analysis of Secure Strategies Against Threats on Cloud PlatformMobile Radio Communications and 5G Networks10.1007/978-981-19-7982-8_37 Article
Synergic Deep Learning for Smart Health Diagnosis of COVID-19 for Connected Living and Smart CitiesACM Transactions on Internet Technology10.1145/3453168 Article
BiSHM: Evidence detection and preservation model for cloud forensicsOpen Computer Science10.1515/comp-2022-0241 Article
Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open ChallengesApplied Sciences10.3390/app11199005 Article
A Comprehensive Survey on Cloud ComputingInternational Journal of Cloud Applications and Computing10.4018/IJCAC.308277 Article
An Optimization Model for Task Scheduling in Mobile Cloud ComputingInternational Journal of Cloud Applications and Computing10.4018/IJCAC.297102 Article
PRNU Anonymous Algorithm Used for Privacy Protection in Biometric Authentication SystemsInternational Journal on Semantic Web and Information Systems10.4018/IJSWIS.317928 Article
Enhancing the Security and Performance of Cloud for E-Governance InfrastructureInternational Journal of Cloud Applications and Computing10.4018/IJCAC.2022010108
Close Top Results From Your Most Recent Search
Close