A review of deep learning security and privacy defensive techniques

MI Tariq, NA Memon, S Ahmed… - Mobile Information …, 2020 - Wiley Online Library
In recent past years, Deep Learning presented an excellent performance in different areas
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …

The impact of cloud-based solutions on digital transformation of HR practices

R Al-Rwaidan, N Aldossary… - … Journal of Data and …, 2023 - growingscience.com
The purpose of this study is to determine the impact of cloud-based solutions on the digital
transformation of human resource (HR) practices in Jordan. The study is quantitative in …

[PDF][PDF] Cloud data encryption and authentication based on enhanced Merkle hash tree method.

JS Jayaprakash, K Balasubramanian… - … Materials & Continua, 2022 - cdn.techscience.cn
Many organizations apply cloud computing to store and effectively process data for various
applications. The user uploads the data in the cloud has less security due to the unreliable …

Factors influencing SMEs' adoption of cloud computing services in Lebanon: An empirical analysis using TOE and contextual theory

M Skafi, MM Yunis, A Zekri - IEEE Access, 2020 - ieeexplore.ieee.org
An increasingly important advancement in information and communication technologies is
cloud computing, and a remarkably increasing trend is its adoption by various organizations …

Game-based Sprint retrospectives: multiple action research

A Przybyłek, M Albecka, O Springer… - Empirical Software …, 2022 - Springer
In today's fast-paced world of rapid technological change, software development teams
need to constantly revise their work practices. Not surprisingly, regular reflection on how to …

Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks

MI Tariq, S Ahmed, NA Memon, S Tayyaba, MW Ashraf… - Sensors, 2020 - mdpi.com
With the advent of cloud computing and wireless sensor networks, the number of
cyberattacks has rapidly increased. Therefore, the proportionate security of networks has …

Elicitation of nonfunctional requirements in agile development using cloud computing environment

M Younas, DNA Jawawi, MA Shah, A Mustafa… - IEEE …, 2020 - ieeexplore.ieee.org
Nonfunctional requirements get less attention because functional requirements are
considered more important in the domain of agile software methodologies. This is due to the …

Evaluation of the challenges in the internet of medical things with multicriteria decision making (AHP and TOPSIS) to overcome its obstruction under fuzzy environment

MI Tariq, NA Mian, A Sohail, T Alyas… - Mobile Information …, 2020 - Wiley Online Library
The exponential speed of advancement of innovation has expanded the needs of all users
to avail all their information on the Internet 24/7. The Internet of things (IoT) enables smart …

Cloud enhances agile software development

S Gochhait, SA Butt, T Jamal, A Ali - Cloud Computing Applications …, 2020 - igi-global.com
The software industries follow some patterns (ie, process model to develop any software
product). Agile methodology is the most famous and used process model. It is a trend to …

An analysis of the application of fuzzy logic in cloud computing

MI Tariq, S Tayyaba, N Ali Mian… - Journal of Intelligent …, 2020 - content.iospress.com
Fuzzy logic has wide adoption in every field of study due to its immense advantages and
techniques. In cloud computing, there are many challenges that can be resolved with the …