Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An effective security measures for nuclear power plant using big data analysis approach
S Lee, JH Huh - The Journal of Supercomputing, 2019 - Springer
Among the many hacking attempts carried out against information systems for the past few
years, cyber-attacks that could lead to a national-level threat included attacks against …
years, cyber-attacks that could lead to a national-level threat included attacks against …
[PDF][PDF] Trust as an integral part for success of cloud computing
F Meixner, R Buettner - 2012 - Citeseer
Cloud computing has become a hot topic in research in the enterprise and consumer sector.
It is clear to everyone that the opportunities and applications of cloud computing are …
It is clear to everyone that the opportunities and applications of cloud computing are …
Non-deterministic security driven meta scheduler for distributed cloud organizations
Security is a very complex and challenging problem in Cloud organizations. Ensuring the
security of operations within the cloud by also enforcing the users' own security …
security of operations within the cloud by also enforcing the users' own security …
Evaluation index system of cloud service and the purchase decision-making process based on AHP
G Nie, Q She, D Chen - Proceedings of the 2011 International Conference …, 2011 - Springer
Aiming at the problems existing in the current study on cloud service purchase decision,
especially the evaluation index system is inadequate, as well as the quantification of …
especially the evaluation index system is inadequate, as well as the quantification of …
Big data security
A Jakóbik - Resource Management for Big Data Platforms …, 2016 - Springer
The chapter presents wide variety of topics concerning security in Big Data systems. Security
from end user side, data owner, and data uploader point of view is considered. Selected …
from end user side, data owner, and data uploader point of view is considered. Selected …
Hybrid ant particle swarm genetic algorithm (APSGA) for task scheduling in cloud computing
In cloud computing technology, task scheduling is one of the research challenges. For these
various algorithms, works such as particle swarm optimization (PSO), firefly algorithm, ant …
various algorithms, works such as particle swarm optimization (PSO), firefly algorithm, ant …
Security infrastructure for on-demand provisioned cloud infrastructure services
Providing consistent security services in on-demand provisioned Cloud infrastructure
services is of primary importance due to multi-tenant and potentially multi-provider nature of …
services is of primary importance due to multi-tenant and potentially multi-provider nature of …
[PDF][PDF] Cloud Computing Security Models, Architectures, Issues and Challenges: A Survey: A Survey
Cloud computing a new recently emerged environment for the hosting and delivery of IT
services over a network typically includes on-demand, reliable, customized, self service …
services over a network typically includes on-demand, reliable, customized, self service …
The design of a redundant array of independent net-storages for improved confidentiality in cloud computing
Abstract This article describes how a Redundant Array of Independent Net-storages (RAIN)
can be deployed for confidentiality control in Cloud Computing. The RAIN approach splits …
can be deployed for confidentiality control in Cloud Computing. The RAIN approach splits …
[PDF][PDF] Enhanced data security model for cloud computing platform
AI Siam, HA El-khobby, HS Abd Elkader… - … Journal of Scientific …, 2015 - researchgate.net
Cloud Computing has continuously tremendous importance in the IT research field. As it is
completely rely on sharing both physical and logical resources among numerous users, the …
completely rely on sharing both physical and logical resources among numerous users, the …