[HTML][HTML] A survey of security in cloud, edge, and fog computing

A Ometov, OL Molua, M Komarov, J Nurmi - Sensors, 2022 - mdpi.com
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …

[HTML][HTML] Fog computing security: a review of current applications and security solutions

S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …

[HTML][HTML] A blockchain future for internet of things security: a position paper

M Banerjee, J Lee, KKR Choo - Digital Communications and Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) devices are increasingly being found in civilian and military
contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of …

A survey on FinTech

K Gai, M Qiu, X Sun - Journal of Network and Computer Applications, 2018 - Elsevier
As a new term in the financial industry, FinTech has become a popular term that describes
novel technologies adopted by the financial service institutions. This term covers a large …

A review and future direction of agile, business intelligence, analytics and data science

D Larson, V Chang - International Journal of Information Management, 2016 - Elsevier
Agile methodologies were introduced in 2001. Since this time, practitioners have applied
Agile methodologies to many delivery disciplines. This article explores the application of …

Multi-key privacy-preserving deep learning in cloud computing

P Li, J Li, Z Huang, T Li, CZ Gao, SM Yiu… - Future Generation …, 2017 - Elsevier
Deep learning has attracted a lot of attention and has been applied successfully in many
areas such as bioinformatics, imaging processing, game playing and computer security etc …

Cloud computing adoption framework: A security framework for business clouds

V Chang, YH Kuo, M Ramachandran - Future Generation Computer …, 2016 - Elsevier
This article presents a cloud computing adoption framework (CCAF) security suitable for
business clouds. CCAF multilayered security is based on the development and integration of …

Intelligent cryptography approach for secure distributed big data storage in cloud computing

Y Li, K Gai, L Qiu, M Qiu, H Zhao - Information Sciences, 2017 - Elsevier
Implementing cloud computing empowers numerous paths for Web-based service offerings
to meet diverse needs. However, the data security and privacy has become a critical issue …

Genetic convolutional neural network for intrusion detection systems

MT Nguyen, K Kim - Future Generation Computer Systems, 2020 - Elsevier
Intrusion detection is the identification of unauthorized access of a computer network. This
paper proposes a novel algorithm for a network intrusion detection system (NIDS) using an …

[HTML][HTML] A review on internet of things for defense and public safety

P Fraga-Lamas, TM Fernández-Caramés… - Sensors, 2016 - mdpi.com
The Internet of Things (IoT) is undeniably transforming the way that organizations
communicate and organize everyday businesses and industrial procedures. Its adoption has …