Beyond lightning: A survey on security challenges in cloud computing

C Rong, ST Nguyen, MG Jaatun - Computers & Electrical Engineering, 2013 - Elsevier
Cloud computing is a model to provide convenient, on-demand access to a shared pool
configurable computing resources. In cloud computing, IT-related capabilities are provided …

Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing

S Wang, Z Liu, Q Sun, H Zou, F Yang - Journal of Intelligent Manufacturing, 2014 - Springer
Cloud computing promises to provide high quality, on-demand services with service-
oriented architecture. However, cloud service typically come with various levels of services …

Data security and privacy information challenges in cloud computing

W Kong, Y Lei, J Ma - International Journal of …, 2018 - inderscienceonline.com
Cloud computing is becoming the hotspot in the area of information technology. However,
when examining its convenience and strong ability in data processing, we also find that …

[PDF][PDF] Metaverse's Virtual Reality and Its Impact on the Buying Behavior-an Empirical Study.

V Busse, C Strauss - COLINS (2), 2023 - researchgate.net
Metaverse represents a novel iteration of the future internet which currently features various
technologies. This makes the scope of applications extremely broad. An important B2C …

A service scenario generation scheme based on association rule mining for elderly surveillance system in a smart home environment

KJ Kang, B Ka, SJ Kim - Engineering Applications of Artificial Intelligence, 2012 - Elsevier
More convenient smart home environments can be constructed by monitoring home
appliances, if automated services are supported by their usage information. This paper …

Beacon technology for retailers-tracking consumer behavior inside brick-and-mortar-stores

A Voelz, A Mladenow, C Strauss - … 2021, Virtual Event, September 27–30 …, 2021 - Springer
For many years, brick-and-mortar retail has been confronted with an ever-growing e-
commerce as a strong competing alternative, and challenging customer expectations. As a …

A practical implementation of fuzzy fingerprint vault for smart cards

D Moon, Y Chung, C Seo, SY Kim, JN Kim - Journal of intelligent …, 2014 - Springer
Biometric-based authentication can provide strong security guarantee about the identity of
users. However, security of biometric data is particularly important as the compromise of the …

Latency and jitter analysis for ieee 802.11 e wireless lans

S Youm, EJ Kim - Journal of Applied Mathematics, 2013 - Wiley Online Library
This paper presents a numerical analysis of latency and jitter for IEEE 802.11 e wireless
local area networks (WLANs) in a saturation condition, by using a Markov model. We use …

Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware

YH Moon, E Kim, SM Hur… - Security and …, 2012 - Wiley Online Library
As botnets have become the primary means for cyber attacks, how to detect botnets
becomes an important issue for researchers and practitioners. In this study, we introduce a …

Design criteria of public e-services

BF Hübl, L Šepeľová - … in Information & Knowledge Management for …, 2022 - Springer
Electronic services enable governments to interact effectively with citizens, companies, their
employees, and other governments 24 ha day. In the interests of maximum usability, these …