Keeping up with threat intelligence is a must for a security analyst today. There is a volume of information present inthe wild'that affects an organization. We need to develop an artificial …
N Khurana, S Mittal, A Piplai… - 2019 IEEE 29th …, 2019 - ieeexplore.ieee.org
As AI systems become more ubiquitous, securing them becomes an emerging challenge. Over the years, with the surge in online social media use and the data available for analysis …
V Singh, SK Pandey - Cloud Computing for Geospatial Big Data Analytics …, 2019 - Springer
Research study in cloud computing technology reveals the realization of security importance within its versatile areas. The present security concerns related to issues and challenges …
H RAZOUKI - International Journal of Computer Network and …, 2019 - mecs-press.org
The mobile agent security problem limits the use of mobile agent technology and hinders its extensibility and application because the constantly progressed complexity and extension at …
B Duncan - Cloud computing, 2019 - researchgate.net
The EU General Data Protection Regulation (GDPR) has been with us now since the 25th May 2018. It is certainly the case that in many of the 28 EU countries, regulators were not all …
B Duncan, Y Zhao - CLOUD COMPUTING 2019, 2019 - researchgate.net
In the current business climate, there is an ever growing need for companies to comply with a range of legislation, regulation and standards. There is also a need for companies to be …
Keeping up with threat intelligence is a must for a security analyst today. There is a volume of information present in'the wild'that affects an organization. We need to develop an artificial …
M Labaj, K Rástočný, D Chudá - … Conference on Current Trends in Theory …, 2019 - Springer
Cloud service providers who offer services to their users traditionally signal security of their offerings through certifications based on various certification schemes. Currently, a vast …
Cloud applications are by nature dynamic and must react to variations in use, and evolve to adopt new Cloud services, and exploit new capabilities offered by Edge and Fog devices, or …