1
Bajeja, Sunil
2024
Table of Contents:
“...Artificial Intelligence -- Machine Learning -- Deep Learning -- Neural Networks -- Image Processing -- Smart Computing -- Cloud Computing Security -- IoT -- Blockchain -- Cyber Security -- Systems Security -- Cryptography -- Encryption -- Attacks...”2024
Full text
2
Bajeja, Sunil
2024
Table of Contents:
“...Artificial Intelligence -- Machine Learning -- Deep Learning -- Neural Networks -- Image Processing -- Smart Computing -- Cloud Computing Security -- IoT -- Blockchain -- Cyber Security -- Systems Security -- Cryptography -- Encryption -- Attacks...”2024
Full text
3
Bajeja, Sunil
2024
Table of Contents:
“...Artificial Intelligence -- Machine Learning -- Deep Learning -- Neural Networks -- Image Processing -- Smart Computing -- Cloud Computing Security -- IoT -- Blockchain -- Cyber Security -- Systems Security -- Cryptography -- Encryption -- Attacks...”2024
Full text
4
Bajeja, Sunil
2024
Table of Contents:
“...Artificial Intelligence -- Machine Learning -- Deep Learning -- Neural Networks -- Image Processing -- Smart Computing -- Cloud Computing Security -- IoT -- Blockchain -- Cyber Security -- Systems Security -- Cryptography -- Encryption -- Attacks...”2024
Full text
5
Table of Contents:
“... with Random Forest-Based Anomaly Detection. -- A Survey of Challenges Associated with Cloud Computing Security....”
Full text
Full text
6
Table of Contents:
“... applications -- Low Light image Illumination Adjustment using Fusion of MIRNet and Deep Illumination Curves -- A HYBRID INTELLIGENT CRYPTOGRAPHY ALGORITHM FOR DISTRIBUTED BIG DATA STORAGE IN CLOUD COMPUTING SECURITY -- An Ensemble Technique to Detect Stress...”
Full text
Full text
7
8
Anand, Darpan
2023
Table of Contents:
“... consumption forecasting -- Chaotic Quasi-Oppositional Chemical Reaction Optimization for Optimal Tuning of Single Input Power System Stabilizer -- Network Intrusion Detection System for Cloud Computing security usingDeep Neural Network framework -- Detection...”2023
Full text
9
10
11
12
Anwar, Sajid
2022
Table of Contents:
“... Intelligence -- Pervasive Environments -- Pervasive Information Systems Applied to Social Solutions -- Pervasive Systems Based on Cloud Computing -- Security in Information Systems -- Security, Trust, and Privacy Issues in IoT -- Smart Home IoT -- Smart Destinations...”2022
Full text
13
Table of Contents:
“... -- Recommender Systems in the Next Generation Cloud Architectures -- Collusion Detection in the Internet of Vehicles Environment via Machine Learning Algorithms -- Mobile Cloud Computing Security Strategies Using Machine Learning Algorithms -- Resilient Edge Computing...”
Full text
Full text
14
Mandal, J.K.
2021
Table of Contents:
“...Active Security by Implementing Intrusion Detection and Facial Recognition -- Image Processing Using Median Filtering for Identification of Leaf Disease -- Cloud Computing: Security Issues and Challenges -- Application of Knowledge and Data Mining...”2021
Full text
15
Kryvinska, Natalia
2021
Table of Contents:
“...: Critical Differences in Theory, Implementation, and Applicability of Two Growing Cloud Services -- Management and Measuring Customer Loyalty in Digital Marketplace - Analysis of KPIs and Influence Factors in CLTV -- Cost-effective solutions in Cloud Computing...”2021
Full text
16
Agrawal, Rashmi
2021
Table of Contents:
“...1. Introduction to Blockchain Technology -- 2. Cloud Computing Security using Blockchain Technology -- 3. An Introduction to Blockchain Technology and their Applications in the Actuality with a View of its Security Aspects -- 4. Blockchain based Cyber...”2021
Full text
17
18
19
20