A risk comparison framework for evaluating the impact of telecom cloudification in organizational risk profile

B Jose, TR Ramanan, SDM Kumar - Telecommunication Systems, 2021 - Springer
Cloud computing has provided new dimensions and opportunities to telecom providers to
enhance their ability in creating new revenue streams, reduce operational costs and …

Financial security risk detection in colleges and universities relying on big data clustering center scheduling algorithm

C Xia - Advances in Multimedia, 2022 - Wiley Online Library
In order to improve the monitoring effect of financial security risk in colleges and universities,
this paper studies the financial security risk control of colleges and universities combined …

A comparative study on anonymizing networks: ToR, I2P, and riffle networks comparison

M Hosseini Shirvani, A Akbarifar - Journal of Electrical and Computer …, 2022 - jecei.sru.ac.ir
Background and Objectives: Among miscellaneous networks, onion-based routing network
technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I2P), and …

[PDF][PDF] Data migration in cloud: A systematic review

M Ansar, MW Ashraf, M Fatima - Am. Sci. Res. J. Eng. Technol. Sci …, 2018 - academia.edu
Data migration needs to securely transfer for maintaining confidentiality such that migration
can strongly and effectively done with no data loss due to active attacks. Many techniques …

Experiential probabilistic assessment of cloud services

M Fahmideh, G Beydoun, G Low - Information Sciences, 2019 - Elsevier
Substantial difficulties in adopting cloud services are often encountered during upgrades of
existing software systems. A reliable early stage analysis can facilitate an informed decision …

Communication-aware traffic stream optimization for virtual machine placement in cloud datacenters with VL2 topology

S Farzai, M Hosseini Shirvani… - Journal of Advances in …, 2020 - jacr.sari.iau.ir
By pervasiveness of cloud computing, a colossal amount of applications from gigantic
organizations increasingly tend to rely on cloud services. These demands caused a great …

Anomaly-based Detection of Blackhole Attacks in WSN and MANET Utilizing Quantum-metaheuristic algorithms

M Hosseini Shirvani, A Akbarifar - Journal of Communication …, 2020 - jce.shahed.ac.ir
Wireless sensor network (WSN) comprises various distributed nodes that are physically
separated. Nodes are constantly applying for sensing their environment. If the information …

An adaptive plan‐oriented and continuous software migration to cloud in dynamic enterprises

SY Nabavi, O Bushehrian - Software: Practice and Experience, 2019 - Wiley Online Library
Replacing existing software/hardware components with their equivalent cloud services is an
important decision faced by IT managers in today's enterprises. A variety of possible …

An adaptive and cost‐efficient migration to cloud approach in dynamic environments

O Bushehrian, SY Nabavi - Concurrency and Computation …, 2021 - Wiley Online Library
Due to the variety in available cloud providers along with the frequent changes in strategic
objectives of an enterprise, migrating existing software components to the cloud has become …

Human error analysis for unsafe events of cloud ERP based on FTA-BN

Z Bingjian, SU Qin, LIU Hailong - China Safety Science Journal, 2023 - cssjj.com.cn
In order to figure out the human error factors of unsafe events of cloud ERP, a human error
analysis model based on FTA-BN was constructed, which could avoid the limitations of a …