[1]
|
Analysis of Cloud Computing and Cloud Storage in Mobile Forensics Using the DEMATEL Method
Computer Science, Engineering and Technology,
2024
DOI:10.46632/cset/2/2/4
|
|
|
[2]
|
Enhancing Cloud Security Posture for Ubiquitous Data Access with a Cybersecurity Framework Based Management Tool
2023 IEEE 14th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON),
2023
DOI:10.1109/UEMCON59035.2023.10316003
|
|
|
[3]
|
Challenges In Cloud Anomaly Detection Using Machine Learning Approaches
2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT),
2022
DOI:10.1109/ICERECT56837.2022.10060686
|
|
|
[4]
|
Automation of cleaning and ensembles for outliers detection in questionnaire data
Expert Systems with Applications,
2022
DOI:10.1016/j.eswa.2022.117809
|
|
|
[5]
|
Eğitimin Dijital Boyutunda Öğrenme-Öğretme Araçları
Uluslararası Karamanoğlu Mehmetbey Eğitim Araştırmaları Dergisi,
2022
DOI:10.47770/ukmead.1120930
|
|
|
[6]
|
Robustness improvement of component-based cloud computing systems
The Journal of Supercomputing,
2022
DOI:10.1007/s11227-021-04054-2
|
|
|
[7]
|
The hindrance of cloud computing acceptance within the financial sectors in Germany
Information & Computer Security,
2022
DOI:10.1108/ICS-01-2021-0002
|
|
|
[8]
|
A Fine-Grained Medical Data Sharing Scheme with Ciphertext Reencryption
Wireless Communications and Mobile Computing,
2022
DOI:10.1155/2022/3923597
|
|
|
[9]
|
A Network Traffic Network Prediction Model with K-Means Optimization Algorithm
Mobile Information Systems,
2022
DOI:10.1155/2022/4511409
|
|
|
[10]
|
Swarm Intelligence Based Data Selection Mechanism for Reputation Generation in Social Cloud
2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON),
2022
DOI:10.1109/COM-IT-CON54601.2022.9850947
|
|
|
[11]
|
Automation of cleaning and ensembles for outliers detection in questionnaire data
Expert Systems with Applications,
2022
DOI:10.1016/j.eswa.2022.117809
|
|
|
[12]
|
Efficient Integrity Checking and Secured Data Sharing in Cloud
2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES),
2022
DOI:10.1109/ICSES55317.2022.9914256
|
|
|
[13]
|
Intrusion detection system in cloud environment: Literature survey & future research directions
International Journal of Information Management Data Insights,
2022
DOI:10.1016/j.jjimei.2022.100134
|
|
|
[14]
|
Eğitimin Dijital Boyutunda Öğrenme-Öğretme Araçları
Uluslararası Karamanoğlu Mehmetbey Eğitim Araştırmaları Dergisi,
2022
DOI:10.47770/ukmead.1120930
|
|
|
[15]
|
Automation of Cleaning and Ensembles for Outliers Detection in Questionnaire Data
SSRN Electronic Journal ,
2022
DOI:10.2139/ssrn.4051305
|
|
|
[16]
|
A service governance and isolation based approach to mitigate internal collateral damages in cloud caused by DDoS attack
Wireless Networks,
2021
DOI:10.1007/s11276-021-02604-3
|
|
|
[17]
|
Deep Learning for Anomaly Detection in Time-Series Data: Review, Analysis, and Guidelines
IEEE Access,
2021
DOI:10.1109/ACCESS.2021.3107975
|
|
|
[18]
|
Security and Privacy in Cloud Computing: Technical Review
Future Internet,
2021
DOI:10.3390/fi14010011
|
|
|
[19]
|
Malware Detection: Issues and Challenges
Journal of Physics: Conference Series,
2021
DOI:10.1088/1742-6596/1807/1/012011
|
|
|
[20]
|
A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment
Peer-to-Peer Networking and Applications,
2020
DOI:10.1007/s12083-020-00975-6
|
|
|
[21]
|
Machine Learning Threatens 5G Security
IEEE Access,
2020
DOI:10.1109/ACCESS.2020.3031966
|
|
|
[22]
|
Anomaly Detection Methods for Categorical Data
ACM Computing Surveys,
2020
DOI:10.1145/3312739
|
|
|
[23]
|
Ensemble Learning for Detecting Attacks and Anomalies in IoT Smart Home
2020 3rd International Conference on Data Intelligence and Security (ICDIS),
2020
DOI:10.1109/ICDIS50059.2020.00014
|
|
|
[24]
|
Anomaly Detection and Processing in Artificial Intelligence for IT Operations of Power System
2019 IEEE 8th International Conference on Advanced Power System Automation and Protection (APAP),
2019
DOI:10.1109/APAP47170.2019.9225115
|
|
|
[25]
|
Data Discovery and Anomaly Detection Using Atypicality for Real-Valued Data
Entropy,
2019
DOI:10.3390/e21030219
|
|
|
[26]
|
Data protection in cloud computing: A Survey of the State-of-Art
Procedia Computer Science,
2019
DOI:10.1016/j.procs.2019.09.170
|
|
|
[27]
|
CloudDet: Interactive Visual Analysis of Anomalous Performances in Cloud Computing Systems
IEEE Transactions on Visualization and Computer Graphics,
2019
DOI:10.1109/TVCG.2019.2934613
|
|
|
[28]
|
A Collective Anomaly Detection Approach for Multidimensional Streams in Mobile Service Security
IEEE Access,
2019
DOI:10.1109/ACCESS.2019.2909750
|
|
|
[29]
|
Security insurance of cloud computing services through cross roads of human-immune and intrusion-detection systems
2018 International Conference on Information Networking (ICOIN),
2018
DOI:10.1109/ICOIN.2018.8343106
|
|
|
[30]
|
Acceptance Test for Fault Detection in Component-based Cloud Computing and Systems
Future Generation Computer Systems,
2017
DOI:10.1016/j.future.2016.06.030
|
|
|
[31]
|
Extension of Kerberos with X.509 and Integration of Elliptic Curve Cryptography in Authentication
International Journal of Communications, Network and System Sciences,
2016
DOI:10.4236/ijcns.2016.912046
|
|
|
[32]
|
Performance analysis of anomaly detection of different IoT datasets using cloud micro services
2016 International Conference on Inventive Computation Technologies (ICICT),
2016
DOI:10.1109/INVENTIVE.2016.7830157
|
|
|
[33]
|
Towards Data Driven Process Control in Manufacturing Car Body Parts
2016 International Conference on Computational Science and Computational Intelligence (CSCI),
2016
DOI:10.1109/CSCI.2016.0093
|
|
|
[34]
|
Comparative Analysis of Wireless Security Protocols: WEP vs WPA
International Journal of Communications, Network and System Sciences,
2015
DOI:10.4236/ijcns.2015.812043
|
|
|
[35]
|
Dissemination of Information Communication Technologies: Mobile Government Practices in Developing States
International Journal of Communications, Network and System Sciences,
2015
DOI:10.4236/ijcns.2015.813049
|
|
|
[36]
|
Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite
International Journal of Communications, Network and System Sciences,
2015
DOI:10.4236/ijcns.2015.813048
|
|
|
[37]
|
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
International Journal of Communications, Network and System Sciences,
2015
DOI:10.4236/ijcns.2015.813051
|
|
|
[38]
|
Review of the Security Issues in Vehicular Ad Hoc Networks (VANET)
International Journal of Communications, Network and System Sciences,
2015
DOI:10.4236/ijcns.2015.813050
|
|
|
[39]
|
Security and Optimization Challenges of Green Data Centers
International Journal of Communications, Network and System Sciences,
2015
DOI:10.4236/ijcns.2015.812044
|
|
|
[40]
|
Fault Tolerance Mechanisms in Distributed Systems
International Journal of Communications, Network and System Sciences,
2015
DOI:10.4236/ijcns.2015.812042
|
|
|