Information Security: A Coordinated Strategy to Guarantee Data Security in Cloud Computing

KI Jones, R Suchithra - International Journal of Data Informatics and …, 2023 - ijdiic.com
This paper discusses different techniques and specialized procedures which can be used to
effectively protect data from the owner to the cloud and then to the user. The next step …

[PDF][PDF] Securing Hypervisors in Cloud Computing Environments against Malware Injection

MA Qurashi - Indian Journal of Science and …, 2023 - sciresol.s3.us-east-2.amazonaws …
Objectives: The primary objectives of this research are to address the security concerns
related to cloud computing, emphasising attacks that target different hypervisor layers. The …

Development of an improved SSL/TLS protocol using post-quantum algorithms

S Yevseiev, A Havrylova, S Milevskyi, I Sinitsyn… - 2023 - dspace.uzhnu.edu.ua
The development of Internet technologies together with mobile and computer technologies
have formed smart technologies that allow the formation of both cyber-physical and socio …

[PDF][PDF] Employing Incremental Learning for the Detection of Multiclass New Malware Variants

ME Alzahrani - Indian Journal of Science and …, 2024 - sciresol.s3.us-east-2.amazonaws …
Abstract Background/Objectives: The study aims to achieve two main objectives. The first is
to reliably identify and categorize malware variations to maintain the security of computer …