© 2016 Global IT Research Institute (GiRI). Business enterprises are competing to get their applications up and running faster with improved manageability and less maintenance by reassigning the ability to IT specialists to adjust resources in order to meet business fluctuating needs. This can be achieved through utilizing the Cloud Computing Model which is distinguished by \u27pay as you go\u27 model. The model offers solutions of storage, convenient and on-demand access to a shared pool of configurable computing resources. As with any novel technology, Cloud Computing is subject to security threats and vulnerabilities including network threats, information threats and underlying infrastructure threats. In this paper, we present a framewor...
In this paper we present the current results and analysis of the survey Cloud forensics and critica...
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in defensive cyber...
© 2017 IEEE. This paper discusses the problem of collusion attacks in Internet of Things (IoT) envir...
© 2019 IEEE. Cloud computing is used for storing, processing, and exchanging information within a co...
Cloud computing is a widely expanding and rapidly adopted field of technology. The ability to grant ...
© 2020 John Wiley & Sons, Ltd. The rapidly growing cloud computing paradigm provides a cost-effect...
© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering....
Internet‐of‐Thing (IoT) is a rapid‐emerging technology that exploits the concept of internetwork to ...
© 2018 IEEE. This research aims to identify some vulnerabilities of advanced persistent threat (APT)...
© 2016 IEEE. Cloud computing is a highly promising technology, but deficient trust management is hin...
The Internet of Things (IoT), which has accelerated the digital transformation technology revolution...
Copyright © 2019 Inderscience Enterprises Ltd. Cloud computing (CC) represents a key tool in the rac...
Cloud computing is an emerging technology paradigm that migrates current technological and computing...
Cyber-attacks in IoT enabled devices have grown at an alarming rate since the start of the Covid-19 ...
This paper discusses the use of Aspect-Oriented Programming (AOP) as an efficient way to handle clou...
In this paper we present the current results and analysis of the survey Cloud forensics and critica...
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in defensive cyber...
© 2017 IEEE. This paper discusses the problem of collusion attacks in Internet of Things (IoT) envir...
© 2019 IEEE. Cloud computing is used for storing, processing, and exchanging information within a co...
Cloud computing is a widely expanding and rapidly adopted field of technology. The ability to grant ...
© 2020 John Wiley & Sons, Ltd. The rapidly growing cloud computing paradigm provides a cost-effect...
© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering....
Internet‐of‐Thing (IoT) is a rapid‐emerging technology that exploits the concept of internetwork to ...
© 2018 IEEE. This research aims to identify some vulnerabilities of advanced persistent threat (APT)...
© 2016 IEEE. Cloud computing is a highly promising technology, but deficient trust management is hin...
The Internet of Things (IoT), which has accelerated the digital transformation technology revolution...
Copyright © 2019 Inderscience Enterprises Ltd. Cloud computing (CC) represents a key tool in the rac...
Cloud computing is an emerging technology paradigm that migrates current technological and computing...
Cyber-attacks in IoT enabled devices have grown at an alarming rate since the start of the Covid-19 ...
This paper discusses the use of Aspect-Oriented Programming (AOP) as an efficient way to handle clou...
In this paper we present the current results and analysis of the survey Cloud forensics and critica...
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in defensive cyber...
© 2017 IEEE. This paper discusses the problem of collusion attacks in Internet of Things (IoT) envir...