B Omogbehin, T Sigwele, T Semong - Machine Learning, 2024 - researchgate.net
In the rapidly evolving landscape of cloud computing, securing data access has become a paramount concern. As organizations increasingly migrate their operations to cloud …
R Ramamoorthy, RK Ranganathan… - Yanbu Journal of …, 2024 - yjes.scholasticahq.com
Cloud computing (CC) offers on demand, flexible resources and services over the internet, to secure cloud assets and resources, privacy and security remains a difficult challenge. To …
X Wan, G Xue, Y Zhong, Z Wang - 2024 - researchsquare.com
Intrusion detection maintains the normal activity of the network system by identifying abnormal connections, while intrusion analysis further identifies specific types of …