Recent trends in applying TPM to cloud computing

S Hosseinzadeh, B Sequeiros, PRM Inácio… - Security and …, 2020 - Wiley Online Library
Trusted platform modules (TPM) have become important safe‐guards against variety of
software‐based attacks. By providing a limited set of cryptographic services through a well …

[PDF][PDF] Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud Environment.

P Dhiman, SK Henge, S Singh, A Kaur… - … Materials & Continua, 2023 - cdn.techscience.cn
This research paper puts emphasis on using cloud computing with Blockchain (BC) to
improve the security and privacy in a cloud. The security of data is not guaranteed as there is …

An uncertainty trust assessment scheme for trustworthy partner selection in online games

P Srikanth, A Kumar, M Hedabou - IEEE Access, 2022 - ieeexplore.ieee.org
Purpose: An advances in technology, offline activities are moving toward online by creating
the virtual environment (VE). The VE applications include video conferences, video chats …

Multi-objective optimization design of steel structure building energy consumption simulation based on genetic algorithm

Y Ren, S Rubaiee, A Ahmed, AM Othman… - Nonlinear …, 2022 - degruyter.com
In order to solve the problems of data acquisition, quantitative analysis and model solving in
the field of construction schedule optimization, a construction schedule optimization system …

Big data intelligent collection and network failure analysis based on artificial intelligence

J Ding, R Alroobaea, AM Baqasah, A Althobaiti… - Informatica, 2022 - informatica.si
In order to explore the intelligent collection of big data and network fault analysis, this paper
proposes a big data intelligent collection and network fault analysis based on artificial …

Study on library management system based on data mining and clustering algorithm

J Wang, R Alroobaea, AM Baqasah, A Althobaiti… - Informatica, 2023 - informatica.si
In order to improve the information retrieval and resource sharing abilities of the library and
establish an intelligent library information management system, alibrary management …

Implementation of network information security monitoring system based on adaptive deep detection

J Niu, R Alroobaea, AM Baqasah… - Journal of Intelligent …, 2022 - degruyter.com
For a better detection in Network information security monitoring system, the author
proposes a method based on adaptive depth detection. A deep belief network (DBN) was …

Research on data mining method of network security situation awareness based on cloud computing

Y Zhou, G Zhao, R Alroobaea, AM Baqasah… - Journal of Intelligent …, 2022 - degruyter.com
Due to the complexity and versatility of network security alarm data, a cloud-based network
security data extraction method is proposed to address the inability to effectively understand …

An assured deletion technique for cloud-based IoT

B Hall, M Govindarasu - 2018 27th International Conference on …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) and the cloud are expanding technologies with many security
vulnerabilities. With at least one major data leak every year since 2004, the public's concern …

Modern method and software tool for guaranteed data deletion in advanced big data systems

S Gnatyuk, V Kinzeryavyy, T Sapozhnik… - Advances in Artificial …, 2020 - Springer
In today's digitally empowered world, confidential data protection is a bit difficult especially
when the user lacks knowledge about the importance of data sanitization before discarding …