A survey on cloud computing security: Issues, threats, and solutions

S Singh, YS Jeong, JH Park - Journal of Network and Computer …, 2016 - Elsevier
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …

Classifying urban land use by integrating remote sensing and social media data

X Liu, J He, Y Yao, J Zhang, H Liang… - International Journal …, 2017 - Taylor & Francis
Urban land use information plays an important role in urban management, government
policy-making, and population activity monitoring. However, the accurate classification of …

Delineating urban functional areas with building-level social media data: A dynamic time warping (DTW) distance based k-medoids method

Y Chen, X Liu, X Li, X Liu, Y Yao, G Hu, X Xu… - Landscape and Urban …, 2017 - Elsevier
This paper presents a novel method for delineating urban functional areas based on
building-level social media data. Our method assumes that social media activities in …

[HTML][HTML] Forensics for multi-stage cyber incidents: Survey and future directions

A Nisioti, G Loukas, A Mylonas, E Panaousis - … Science International: Digital …, 2023 - Elsevier
The increase in the complexity and sophistication of multi-stage cyber attacks, such as
advanced persistent threats, paired with the large volume of data produced by modern …

[HTML][HTML] A review on clustering techniques: Creating better user experience for online roadshow

ZY Lim, LY Ong, MC Leow - Future Internet, 2021 - mdpi.com
Online roadshow is a relatively new concept that has higher flexibility and scalability
compared to the physical roadshow. This is because online roadshow is accessible through …

Exploring the spatial differentiation of urbanization on two sides of the Hu Huanyong Line--based on nighttime light data and cellular automata

D Chen, Y Zhang, Y Yao, Y Hong, Q Guan, W Tu - Applied Geography, 2019 - Elsevier
Abstract The Hu Huanyong Line (Hu Line) shows an uneven geographical pattern of
urbanization between Southeast and Northwest China. Based on three questions proposed …

Data-driven decision support for optimizing cyber forensic investigations

A Nisioti, G Loukas, A Laszka… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Cyber attacks consisting of several attack actions can present considerable challenge to
forensic investigations. Consider the case where a cybersecurity breach is suspected …

A study of security threats and attacks in cloud computing

HK Bella, S Vasundra - 2022 4th International Conference on …, 2022 - ieeexplore.ieee.org
In recent decades, cloud computing (CC) has attracted great consideration due to steadily
growing needs. Organizations moving towards cloud data storage solutions have various …

Automation for digital forensics: Towards a definition for the community

G Michelet, F Breitinger, G Horsman - Forensic Science International, 2023 - Elsevier
Automation is crucial for managing the increasing volume of digital evidence. However, the
absence of a clear foundation comprising a definition, classification, and common …

A framework for evaluating Internet-of-Things platforms: Application provider viewpoint

O Mazhelis, P Tyrväinen - 2014 IEEE World Forum on Internet …, 2014 - ieeexplore.ieee.org
Widespread adoption of Internet of Things (IoT) applications assumes a sustainable
ecosystem of firms creating, distributing, and using these applications. Such an ecosystem …