[HTML][HTML] Defensive strategies against PCC attacks based on ideal (t, n)-secret sharing scheme

S Ali, J Wang, VCM Leung - Journal of King Saud University-Computer and …, 2023 - Elsevier
We present a method to increase the dependability of cloud-based applications. Traditional
Secret Sharing Schemes (SSSs) typically fail to counter the challenges brought on by …

[HTML][HTML] Game theory-based virtual machine migration for energy sustainability in cloud data centers

FJ Maldonado-Carrascosa, S García-Galán… - Applied Energy, 2024 - Elsevier
As the demand for cloud computing services increases, optimizing resource allocation and
energy consumption has become a key factor in achieving sustainability in cloud …

Analysis of Network Security in IoT-based Cloud Computing Using Machine Learning

H Naeem - International Journal for Electronic Crime Investigation, 2023 - ijeci.lgu.edu.pk
Network security in IoT-based cloud computing can benefit greatly from the application of
machine learning techniques. IoT devices introduce unique security challenges with their …

The Data Security and multi-cloud Privacy concerns

N Tabassum, H Naeem, A Batool - International Journal for …, 2023 - ijeci.lgu.edu.pk
The security, privacy, and challenges of establishing trust in cloud computing are examined
in this paper. It discusses the issues that must be resolved to guarantee the security, privacy …

Optimizing Virtualization for Client-Based Workloads in Cloud Computing

MI Sarwar - International Journal for Electronic Crime Investigation, 2023 - ijeci.lgu.edu.pk
Cloud computing has transformed the IT field by offering adaptable and versatile resources
to cater to the increasing demands of businesses and organizations. Virtualization …

[PDF][PDF] TASK SCHEDULING FOR VIRTUAL MACHINE MIGRATION IN CLOUD COMPUTING USING ADAPTIVE REINFORCEMENT LEARNING

MZ RAHMAN, AS PICHANDI - Journal of Theoretical and Applied …, 2024 - jatit.org
The number of cloud users and their respective workloads is continuously increasing due to
the inherent benefits of Cloud Computing (CC). Due to the rapid increase in the use of cloud …

Language Translation Technology Based on Mobile Internet

Y Jia, X Yu, X Yang - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
With the rapid development of mobile internet, language translation technology has also
been widely applied and developed. Language translation and communication have been …

Malware Attacks Detection in Network Security using Deep Learning Approaches

H Naeem, A Batool - International Journal for Electronic Crime …, 2023 - ijeci.lgu.edu.pk
This abstract provides an overview of the study on the use of deep learning approaches,
specifically Recurrent Neural Networks (RNNs) and Long Short-Term Memory Networks …

Integration of Cloud Computing and Wearable Technology for Enhanced Interactivity

A Batool, H Naeem - International Journal for Electronic Crime …, 2023 - ijeci.lgu.edu.pk
The emergence of wearable computing has revolutionized the way we interact with
technology, blurring the lines between the physical and digital worlds. In this research, we …

[PDF][PDF] Dynamic user Engagement Analysis through Migrating Load Testing: Unveiling Performance Variability and Optimization Strategies

AH Ali - interactions - romanpub.com
As online platforms continue to evolve in response to dynamic user engagement,
understanding their performance implications becomes paramount. This study introduces a …