Development of cyber security and privacy by precision decentralized actionable threat and risk management for mobile communication using Internet of Things (IOT)

GNK Babu, S Anbu, RK Kapilavani… - AIP Conference …, 2022 - pubs.aip.org
In the recent past, with the tremendous growth of Internet of Things (IoT) and mobile
communication the security and privacy are needed for the information transmitted from …

[PDF][PDF] Critical Review of OpenStack Security: Issues and Weaknesses.

H Albaroodi, S Manickam, PS Bawa - J. Comput. Sci., 2014 - researchgate.net
The purpose of this study is to examine the state of both cloud computing security in general
and OpenStack in particular. Conducting a reassessment of cloud computing security can …

Intelligent therapy aided by advanced computational technology

SR Senthilkumar, GNK Sureshbabu… - AIP Conference …, 2022 - pubs.aip.org
Since from the inception of the humanity, we have been exposed to manifestations of
psychological and behavioral ailments. The approach towards coping with these ailments …

Retrieval of information from remote mobile phone using messages

R Kalpana, B Umamaheswari… - AIP Conference …, 2022 - pubs.aip.org
Mobile phone has become essential for our day to day life activities. MS based remote
mobile access system is a mobile phone based communication application which helps to …

Data extraction in network through Rendezvous Point network

J Jayashankari, R Kalpana… - AIP Conference …, 2022 - pubs.aip.org
Extraction of Data is one of the main tasks in Wireless Sensor Network. In this paper we
propose a new scheme, Rendezvous Point-Data Extraction (RPDC) for normal data and …

An effective cloud computing model enhancing privacy in cloud computing

M Chawki - Information Security Journal: A Global Perspective, 2024 - Taylor & Francis
Cloud computing revolutionizes global software, system, infrastructure, and storage
accessibility, offering flexibility and cost-effectiveness. This paper explores the pivotal …

Time‐bound key‐aggregate encryption for cloud storage

CC Lee, CT Li, ST Chiu… - Security and …, 2016 - Wiley Online Library
Handling huge loads of data that are subject to change within every second, cloud storage
services are facing the challenge of properly dealing with the problem of user legality …

Characteristic based spam detection system to reveal the mock appraise in online social media

M Sirija, J Jayashankari, R Kalpana… - AIP Conference …, 2022 - pubs.aip.org
Online thing overviews have transformed into a crucial wellspring of customer notions and
arrangements. The dangers that anyone can eliminate an examination give an awe inspiring …

Detecting identity based spoofing attacks in wireless network using IDs

BU Maheswari, A Shanthakumari, M Sirija… - AIP Conference …, 2022 - pubs.aip.org
Remote listening in assaults aresimpletodispatch, itplaysacriticalpath within the execution of
remote sensor systems. In spite of the fact that the personality of a hub can be confirmed …

[PDF][PDF] A proposed framework for outsourcing and secure encrypted data on OpenStack object storage (Swift)

H Albaroodi, S Manickam, M Anbar - Journal of Computer Science, 2015 - researchgate.net
Despite the numerous potential benefits of Open Source Cloud Computing (OSCC) in
several industrial and academic-oriented environments, OSCC could be also associated …