A collaborative detection method of wireless mobile network intrusion based on cloud computing

X Wang - Wireless Communications and Mobile Computing, 2022 - Wiley Online Library
In order to improve the communication security of wireless mobile network, a collaborative
intrusion detection method based on cloud computing is studied. The mobile terminal and …

Unified security framework for cloud applications with iot fusion via decentralized blockchain

B Mohanraj, M Priya, DA Jaleel… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
Recent advancements in blockchain-based cloud computing highlight its potential in
providing robust data security, integrity, and confidentiality. While cloud computing is …

Aspects to determine the acceptance of cloud service: A study of cloud professionals

P Goyal, SS Deora - 2023 14th International Conference on …, 2023 - ieeexplore.ieee.org
Cloud computing is an essential innovation in communication and information technology. In
today's scenario, any business, big or small, can use cloud services because they are …

SelTCS: a framework for selecting trustworthy cloud services

N Thakur, A Singh, AL Sangal - Sādhanā, 2023 - Springer
Cloud computing is a computer science paradigm that has grown significantly in recent
years. It provides on-demand access to a diverse set of software, infrastructure and platform …

Transaction Fraud Detection Using SMOTE Oversampling

M Marimuthu, K Lekshmi, P Saravanan… - 2024 First …, 2024 - ieeexplore.ieee.org
Credit card fraud detection remains a critical challenge in financial transactions, particularly
due to the prevalence of unbalanced datasets and the limitations of traditional algorithms …

[PDF][PDF] Distributed Cloud Architecture on Digital Repository for Digital Transformation

J Karapakdee, P Pawnsawan, S Issaro… - International Journal …, 2022 - researchgate.net
The purpose of this study is to study distributed cloud architecture on digital repository for
digital transformation resulting from technological progress, given that efforts should be …

Cloud Broker Recommendation Framework to Provide Trustworthy Cloud Services to the End User: Cloud Broker Recommendation Framework to provide Trustworthy …

M Marimuthu, J Akilandeswari, B Varasree… - … Computing: Practice and …, 2022 - scpe.org
In recent years, many cloud services have become available on the Website}. Discovering
suitable cloud services for the end user is incredibly complex and difficult. The cloud …

An Adaptive Cloud and Internet of Things-Based Disease Detection Approach for Secure Healthcare system

A Mitra, V Ammu, R Chowdhury… - 2024 International …, 2024 - ieeexplore.ieee.org
The role of the Internet of Things (IoT) in disease data handling, analysis, prediction, and
classification is prominent due to digital electronic healthcare records (EHRs). This article …

Breast cancer detection in digital mammography using a novel hybrid approach of Salp Swarm and Cuckoo Search algorithm with deep belief network classifier

R Reenadevi, B Sathiyabhama, S Sankar… - The Imaging Science …, 2021 - Taylor & Francis
ABSTRACT The Computer Aided Diagnosis (CAD) system has evolved as a useful tool for
radiologists to classify breast cancer images into various categories, enabling early …

Blockchain Technology for Protecting Ingenuity of Image

N Sarmiladevi, RM Balajee… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Hash link is exploited for digital images to obtain imagecord concepts derived from
cryptographic formation. The primary difference from the Blockchain imagecord concept is …