Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …

A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing

MT Khorshed, ABMS Ali, SA Wasimi - Future Generation computer systems, 2012 - Elsevier
The long-term potential benefits through reduction of cost of services and improvement of
business outcomes make Cloud Computing an attractive proposition these days. To make it …

Trust issues that create threats for cyber attacks in cloud computing

MT Khorshed, ABMS Ali… - 2011 IEEE 17th …, 2011 - ieeexplore.ieee.org
The research contribution in this paper is twofold. First, an investigative survey on cloud
computing is conducted with the main focus on gaps that is slowing down cloud adoption as …

Active flow control optimisation on SD7003 airfoil at pre and post-stall angles of attack using synthetic jets

NM Tousi, M Coma, JM Bergada, J Pons-Prats… - Applied Mathematical …, 2021 - Elsevier
Abstract The use of Active Flow Control (AFC) technologies to modify the forces acting on
streamlined bodies is one of the most active research fields in aerodynamics. For each …

Neural networks for variational problems in engineering

R López, E Balsa‐Canto… - International Journal for …, 2008 - Wiley Online Library
In this work a conceptual theory of neural networks (NNs) from the perspective of functional
analysis and variational calculus is presented. Within this formulation, the learning problem …

Monitoring insiders activities in cloud computing using rule based learning

MT Khorshed, ABMS Ali… - … Conference on Trust …, 2011 - ieeexplore.ieee.org
One of the essential but formidable tasks in cloud computing is to detect malicious attacks
and their types. A cloud provider's constraints or inability in monitoring its employees, and …

Classifying different denial‐of‐service attacks in cloud computing using rule‐based learning

MT Khorshed, ABMS Ali… - Security and …, 2012 - Wiley Online Library
From traditional networking to cloud computing, one of the essential but formidable tasks is
to detect cyber attacks and their types. A cloud provider's unwillingness to share security …

[HTML][HTML] The Optimization of Culture Conditions for Injectable Recombinant Collagen Hydrogel Preparation Using Machine Learning

M Li, L Zhao, Y Ren, L Zuo, Z Shen, J Wu - Gels, 2025 - mdpi.com
Injectable recombinant collagen hydrogels (RCHs) are crucial in biomedical applications.
Culture conditions play an important role in the preparation of hydrogels. However …

[PDF][PDF] C2DF: High rate DDOS filtering method in cloud computing

P Shamsolmoali, MA Alam, R Biswas - International Journal of Computer …, 2014 - Citeseer
Distributed Denial of Service (DDOS) attacks have become one of the main threats in cloud
environment. A DDOS attack can make large scale of damages to resources and access of …

[PDF][PDF] Application of intelligent data mining approach in securing the cloud computing

HM Said, I El Emary, BA Alyoubi… - … Journal of Advanced …, 2016 - pdfs.semanticscholar.org
Cloud computing is a modern term refers to a model for emerging computing, where it is
possible to use machines in large data centers for delivering services in a scalable manner …