A review of deep learning security and privacy defensive techniques
In recent past years, Deep Learning presented an excellent performance in different areas
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …
The impact of cloud-based solutions on digital transformation of HR practices
R Al-Rwaidan, N Aldossary… - … Journal of Data and …, 2023 - growingscience.com
The purpose of this study is to determine the impact of cloud-based solutions on the digital
transformation of human resource (HR) practices in Jordan. The study is quantitative in …
transformation of human resource (HR) practices in Jordan. The study is quantitative in …
[PDF][PDF] Cloud data encryption and authentication based on enhanced Merkle hash tree method.
Many organizations apply cloud computing to store and effectively process data for various
applications. The user uploads the data in the cloud has less security due to the unreliable …
applications. The user uploads the data in the cloud has less security due to the unreliable …
Factors influencing SMEs' adoption of cloud computing services in Lebanon: An empirical analysis using TOE and contextual theory
An increasingly important advancement in information and communication technologies is
cloud computing, and a remarkably increasing trend is its adoption by various organizations …
cloud computing, and a remarkably increasing trend is its adoption by various organizations …
Game-based Sprint retrospectives: multiple action research
A Przybyłek, M Albecka, O Springer… - Empirical Software …, 2022 - Springer
In today's fast-paced world of rapid technological change, software development teams
need to constantly revise their work practices. Not surprisingly, regular reflection on how to …
need to constantly revise their work practices. Not surprisingly, regular reflection on how to …
Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks
With the advent of cloud computing and wireless sensor networks, the number of
cyberattacks has rapidly increased. Therefore, the proportionate security of networks has …
cyberattacks has rapidly increased. Therefore, the proportionate security of networks has …
Elicitation of nonfunctional requirements in agile development using cloud computing environment
Nonfunctional requirements get less attention because functional requirements are
considered more important in the domain of agile software methodologies. This is due to the …
considered more important in the domain of agile software methodologies. This is due to the …
Evaluation of the challenges in the internet of medical things with multicriteria decision making (AHP and TOPSIS) to overcome its obstruction under fuzzy environment
The exponential speed of advancement of innovation has expanded the needs of all users
to avail all their information on the Internet 24/7. The Internet of things (IoT) enables smart …
to avail all their information on the Internet 24/7. The Internet of things (IoT) enables smart …
Cloud enhances agile software development
The software industries follow some patterns (ie, process model to develop any software
product). Agile methodology is the most famous and used process model. It is a trend to …
product). Agile methodology is the most famous and used process model. It is a trend to …
SteriCNN: Cloud native stego content sterilization framework
Modern robust steganography-based cyber attacks often bypass intrinsic cloud security
measures, and contemporary steganalysis methods struggle to address these covert threats …
measures, and contemporary steganalysis methods struggle to address these covert threats …