FM Awaysheh, M Alazab, S Garg… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Big Data (BD) platforms have a long tradition of leveraging trends and technologies from the broader computer network and communication community. For several years, dedicated …
MN Ramachandra, M Srinivasa Rao, WC Lai… - Big Data and Cognitive …, 2022 - mdpi.com
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive …
S Boopathi - Improving Security, Privacy, and Trust in Cloud …, 2024 - igi-global.com
This chapter delves into the intricate relationship between innovation and security in the digital age. It highlights the challenges of the digital age and the transformative impact of …
K Lone, SA Sofi - High-Confidence Computing, 2023 - Elsevier
There is an exponential increase in the number of smart devices, generating helpful information and posing a serious challenge while processing this huge data. The processing …
Fifth-generation (5G) mobile networks have already marked their presence globally, revolutionizing entertainment, business, healthcare, and other domains. While this leap …
SY Huang, CY Chen, JY Chen, HC Chao - Symmetry, 2023 - mdpi.com
Fifth-generation mobile communication networks (5G)/Beyond 5G (B5G) can achieve higher data rates, more significant connectivity, and lower latency to provide various mobile …
In recent times, fog computing has emerged as a helpful extension of cloud computing. It can efficiently handle the prevalent issue of managing silos of data generated by today's digital …
AK Nanda, A Sharma, PJ Augustine… - … Security, Privacy, and …, 2024 - igi-global.com
Cloud computing has revolutionized IT infrastructure deployment and management, but it also presents security and resilience challenges. The study delves into the principles and …
Internet of Things (IoT) systems are complex systems that can manage mission-critical, costly operations or the collection, storage, and processing of sensitive data. Therefore …