[PDF][PDF] LSTM deep learning method for network intrusion detection system

A Boukhalfa, A Abdellaoui, N Hmina… - International Journal of …, 2020 - core.ac.uk
The security of the network has become a primary concern for organizations. Attackers use
different means to disrupt services, these various attacks push to think of a new way to block …

[PDF][PDF] Distributed denial of service attacks in cloud computing

H Abusaimeh - International Journal of Advanced Computer Science …, 2020 - academia.edu
The Cloud Computing attacks have been increased since the expanded use of the cloud
computing. One of the famous attacks that targets the cloud computing is the distributed …

[PDF][PDF] A New Cybersecurity Approach for Protecting Cloud Services against DDoS Attacks.

HF El-Sofany - International Journal of Intelligent Engineering & …, 2020 - inass.org
Cybersecurity of cloud services is extremely important, especially when developing web
services and cloud apps. Cloud computing depends on internet connections; therefore, the …

Implementasi sistem keamanan web server menggunakan pfsense

M Arman, N Rachmat - Jusikom: Jurnal Sistem Komputer …, 2020 - jurnal.univbinainsan.ac.id
Pepaya merupakan salah satu buah tropis yang banyak manfaat. Penentuan kualitas buah
pepaya secara konvensional memiliki keterbatasan. Penelitian ini dilakukan untuk …

[PDF][PDF] Optimization and Evaluation of Authentication System using Blockchain Technology

I Riadi, A Ifani, R Kusuma - Emerging Science Journal, 2022 - researchgate.net
User data security innovation is a particular concern in protecting one's privacy rights, which
is one of the serious violations when an attacker can bypass the user authentication so that it …

Detection and Prevention Mechanism for DDoS Attacks in Cloud Computing: The Role of Software-Defined Networking (SDN)

M Dahiya, C Virmani - 2023 5th International Conference on …, 2023 - ieeexplore.ieee.org
Cloud computing has developed as a vital technology for offering on-demand computing
resources that meet the changing requirements of modern applications. The cloud …

Simulasi Keamanan Jaringan Komputer Penerapan Internet Positif

AA Athallah, A Prihanto - Journal of Informatics and Computer …, 2024 - ejournal.unesa.ac.id
Perkembangan digital, internet telah menjadi bagian integral dari kehidupan sehari-hari,
namun juga membawa berbagai risiko keamanan. Penelitian ini mengeksplorasi penerapan …

[PDF][PDF] HASIL CEK_Imam Riadi, Aulyah Zakilah lfani, Ridho Surya K

I Riadi - eprints.uad.ac.id
Internet development in this era is something required by internet users. The big challenge
in using the internet is the existence of illegal attacks to gain access to systems [1]. Many …

A Comprehensive Overview of DDoS Attacks in Cloud Computing Environment and Different Machine Learning Techniques.

S Kati, A Ove, B Gotipamul… - IUP Journal of …, 2022 - search.ebscohost.com
As cloud computing usage gains popularity, the security vulnerabilities are also increasing.
Cloud computing is affected by many types of attacks like account hijacking, data breaches …

[PDF][PDF] A LIGHTWEIGHT SECURE DATA SHARING SCHEME FOR MOBILE CLOUD COMPUTING

MK Kiranma, M Manisaradhi, K Praneeth, GK Kumar… - journal-dogorangsang.in
Mobile devices can now access personal data from anywhere at any time thanks to cloud
computing, but this also raises the possibility of data security breaches in mobile cloud …