[1]
|
Flying through the secure fog: A complete study on UAV‐Fog in heterogeneous networks
|
|
International Journal of Communication …,
2022 |
|
|
[2]
|
Catching a Phish: Frontiers of Deep Learning-Based Anticipating Detection Engines
|
|
International Conference of Reliable Information and …,
2022 |
|
|
[3]
|
Design and Implementation of Internet of Things and Cloud Technology in Flood Risk Mitigation
|
|
… on Cybernetics and Intelligent System (ICORIS …,
2021 |
|
|
[4]
|
Cloud Based Processing of Vibrational Signal for Oil Pipeline Monitoring System
|
|
Iraqi Journal of Computers …,
2021 |
|
|
[5]
|
Vulnerability Assessment and Penetration Testing Approach Towards Cloud-Based Application and Related Services
|
|
2021 |
|
|
[6]
|
AWS Security Issues And Good Practices
|
|
2021 |
|
|
[7]
|
A Perspective of Security Features in Amazon Web Services
|
|
2020 |
|
|
[8]
|
Rizici primjene informacijske tehnologije u poslovanju
|
|
2020 |
|
|
[9]
|
The Use of Biometrics in Multifactor Authentication (MFA) for Cloud Computing Data Storage
|
|
International Journal of Computer Applications,
2019 |
|
|
[10]
|
Predicting the effects of sexual assault research participation: Reactions, perceived insight, and help-seeking
|
|
Journal of interpersonal …,
2019 |
|
|
[11]
|
Системное моделирование акторных взаимодействий для облачных сервисов
|
|
2018 |
|
|
[12]
|
Role of Security Mechanisms in the Building Blocks of the Cloud Infrastructure
|
|
Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management,
2018 |
|
|
[13]
|
Requirement Engineering for Security Issues in Cloud Computing
|
|
2018 |
|
|
[14]
|
Technology of computing risks visualization for distributed production infrastructures
|
|
2018 |
|
|
[15]
|
Cloud Computing and Security Issues—A Review of Amazon Web Services
|
|
2018 |
|
|
[16]
|
A modified Delphi study of challenges archivists encounter adopting cloud storage for long-term digital preservation
|
|
ProQuest Dissertations Publishing,
2017 |
|
|
[17]
|
Data Encryption Scheme for Large Data Scale in Cloud Computing
|
|
2017 |
|
|
[18]
|
Проактивный и реактивный риск-менеджмент IT-сервисов облачных сред
|
|
2017 |
|
|
[19]
|
A design methodology for developing resilient cloud services
|
|
2017 |
|
|
[20]
|
CLOUD COMPUTING SECURITY THROUGH PARALLELIZING FULLY HOMOMORPHIC ENCRYPTION APPLIED TO MULTI-CLOUD APPROACH.
|
|
Journal of Theoretical and Applied Information Technology,
2016 |
|
|
[21]
|
Cloud and Mobile Cloud Architecture, Security and Safety
|
|
Handbook of System Safety and Security,
2016 |
|
|
[22]
|
CLOUD COMPUTING SECURITY THROUGH PARALLELIZING FULLY HOMOMORPHIC ENCRYPTION APPLIED TO MULTI-CLOUD APPROACH
|
|
Journal of Theoretical and Applied Information Technology,
2016 |
|
|
[23]
|
An Adjustable Risk Assessment Method for a Cloud System
|
|
Software Quality, Reliability and Security-Companion (QRS-C), 2015 IEEE International Conference on,
2015 |
|
|
[24]
|
Cloud Computing Data Security Issues, Challenges, Architecture and Methods-A Survey
|
|
2015 |
|
|
[25]
|
Benefits and Risks of Cloud Computing
|
|
|
|
|
[26]
|
The effect of Amazon Web Services (AWS) on Cloud-Computing
|
|
|
|
|