Machine learning based deep job exploration and secure transactions in virtual private cloud systems

S Rajasoundaran, AV Prabu, S Routray… - … & Security, 2021 - Elsevier
… The main goal of this proposed MLSCS model is providing highly secure job analysis …
each cloud job entities and verifies their security measures for initiating secure scheduling …

Transaction Analysis of Security Exploits on Blockchains

M Zhang - 2024 - rave.ohiolink.edu
transactions be leveraged for attacking the Ethereum network? One intriguing transaction
type we observe is private transactions, … We explore potential factors inducing reorganization …

Safe serializable secure scheduling: Transactions and the trade-off between security and consistency

I Sheff, T Magrino, J Liu, AC Myers… - … Security, 2016 - dl.acm.org
… We explore secure scheduling of atomic, serializable … sets of transactions that can safely
complete under secure schedul… to be serializable, Alice’s ordering of the old jobs stopping must …

A behavior-based interruption detection framework for secure internet of things-based smart industry job transactions

M Vijayakumar, TS Shiny Angel - Soft Computing, 2023 - Springer
… automated and error-less manufacturing and job shop processing with the Industrial Internet
Transaction Framework. The main motive of this work is to ensure secure job transactions in …

Design space exploration for secure iot devices and cyber-physical systems

L Gressl, C Steger, U Neffe - … Transactions on Embedded Computing …, 2021 - dl.acm.org
… (DSE) tools to support a system designer in this job. However, available … security attacks
and the architecture’s security capabilities into the design flow, automatically proposing security

Reliable and secure design-space-exploration for cyber-physical systems

SK Ghosh, JS RC, V Jain, S Dey - ACM Transactions on Embedded …, 2020 - dl.acm.org
… , we explore the reliability and security hardening parameters available to us at the task
implementation level to find the task configuration which meets the reliability, safety, and security

Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining

R Jindal, I Singh - Cluster Computing, 2022 - Springer
… To be able to address the problem of data security, we … Therefore, the job of an intrusion
detection system is to track … it presents all the investigations and explorations for WOA, in which a …

Job security and job protection

A Clark, F Postel-Vinay - Oxford Economic Papers, 2009 - academic.oup.com
secure in permanent public sector jobs, least secure in temporary jobs, with permanent
private sector jobs … that perceived job security in both permanent private and temporary jobs is …

Designing secure and dependable mobile sensing mechanisms with revenue guarantees

Y Zhang, H Zhang, S Tang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
… assume a job owner could broadcast its sensing job by “writing” descriptions of its job on a
… However, their solutions mainly focus on how to avoid spectrum interferences and explore

Exploratory Study of M‐Transaction: User's Perspectives

MA Alqahtani, AH Al‐Badi… - The Electronic Journal of …, 2014 - Wiley Online Library
… As m-commerce technologies evolve and their popularity increases, mobile payments should
be able to facilitate the provision of secure electronic transactions between organizations …