A review of deep learning security and privacy defensive techniques

MI Tariq, NA Memon, S Ahmed… - Mobile Information …, 2020 - Wiley Online Library
In recent past years, Deep Learning presented an excellent performance in different areas
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …

The impact of cloud-based solutions on digital transformation of HR practices

R Al-Rwaidan, N Aldossary… - … Journal of Data and …, 2023 - growingscience.com
The purpose of this study is to determine the impact of cloud-based solutions on the digital
transformation of human resource (HR) practices in Jordan. The study is quantitative in …

[PDF][PDF] Cloud data encryption and authentication based on enhanced Merkle hash tree method.

JS Jayaprakash, K Balasubramanian… - … Materials & Continua, 2022 - cdn.techscience.cn
Many organizations apply cloud computing to store and effectively process data for various
applications. The user uploads the data in the cloud has less security due to the unreliable …

Factors influencing SMEs' adoption of cloud computing services in Lebanon: An empirical analysis using TOE and contextual theory

M Skafi, MM Yunis, A Zekri - IEEE Access, 2020 - ieeexplore.ieee.org
An increasingly important advancement in information and communication technologies is
cloud computing, and a remarkably increasing trend is its adoption by various organizations …

Game-based Sprint retrospectives: multiple action research

A Przybyłek, M Albecka, O Springer… - Empirical Software …, 2022 - Springer
In today's fast-paced world of rapid technological change, software development teams
need to constantly revise their work practices. Not surprisingly, regular reflection on how to …

Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks

MI Tariq, S Ahmed, NA Memon, S Tayyaba, MW Ashraf… - Sensors, 2020 - mdpi.com
With the advent of cloud computing and wireless sensor networks, the number of
cyberattacks has rapidly increased. Therefore, the proportionate security of networks has …

Elicitation of nonfunctional requirements in agile development using cloud computing environment

M Younas, DNA Jawawi, MA Shah, A Mustafa… - IEEE …, 2020 - ieeexplore.ieee.org
Nonfunctional requirements get less attention because functional requirements are
considered more important in the domain of agile software methodologies. This is due to the …

Evaluation of the challenges in the internet of medical things with multicriteria decision making (AHP and TOPSIS) to overcome its obstruction under fuzzy environment

MI Tariq, NA Mian, A Sohail, T Alyas… - Mobile Information …, 2020 - Wiley Online Library
The exponential speed of advancement of innovation has expanded the needs of all users
to avail all their information on the Internet 24/7. The Internet of things (IoT) enables smart …

Cloud enhances agile software development

S Gochhait, SA Butt, T Jamal, A Ali - Research anthology on Agile …, 2022 - igi-global.com
The software industries follow some patterns (ie, process model to develop any software
product). Agile methodology is the most famous and used process model. It is a trend to …

SteriCNN: Cloud native stego content sterilization framework

A Banerjee, S Ganguly, I Mukherjee… - Journal of Information …, 2024 - Elsevier
Modern robust steganography-based cyber attacks often bypass intrinsic cloud security
measures, and contemporary steganalysis methods struggle to address these covert threats …