Cybersecurity in the quantum era: Assessing the impact of quantum computing on infrastructure

Y Baseri, V Chouhan, A Ghorbani - arxiv preprint arxiv:2404.10659, 2024 - arxiv.org
The emergence of quantum computing presents a double-edged sword for cybersecurity.
While its immense power holds promise for advancements in various fields, it also threatens …

Current development, challenges, and future trends in cloud computing: A survey

HN Alshareef - … Journal of Advanced Computer Science and …, 2023 - search.proquest.com
Cloud computing is a new paradigm in information and communication technologies (ICTs)
that provides the ability to access shared pools of different computing resources that are …

A review on cloud security issues and solutions

AR Chaudhari, BN Gohil… - Journal of Computer …, 2023 - content.iospress.com
Cloud computing provides computing resources, platforms, and applications as a service in
a flexible, cost-effective, and efficient way. Cloud computing has integrated with industry and …

Performance enhancement of cloud security with migration algorithm for choosing virtual machines in cloud computing

R Manivannan, S Senthilkumar… - Engineering …, 2024 - iopscience.iop.org
The management of the hardware as well as software resources entrusted to third-party
service suppliers have shown to be extraordinarily remarkable and accessible with Cloud …

An OpenRAN security framework for scalable authentication, authorization, and discovery of xapps with isolated critical services

TO Atalay, S Maitra, D Stojadinovic… - … on Dependable and …, 2024 - ieeexplore.ieee.org
The OpenRAN initiative promotes an open Radio Access Network (RAN) and offers
operators fine-grained control over the radio stack. To that end, O-RAN introduces new …

A Model-free Scheduling Method for Heterogeneous Electric Vehicle Cryptographic Task Processing Architecture

X Feng, T Yang, S Cai, Z Yang - IEEE Transactions on Smart …, 2024 - ieeexplore.ieee.org
In recent years, Electric Vehicles (EVs) have become widely used due to their environmental
friendliness. However, the increase in essential supporting Electric Vehicle Supply …

Design of An Anomaly Detection Framework For Delay & Privacy-Aware Blockchain-Based Cloud Deployments

AV Nagarjun, S Rajkumar - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud-based deployments face increasing threats from various types of attacks,
necessitating robust anomaly detection frameworks to safeguard against potential security …

Internet of things security requirements, threats, attacks, and countermeasures

M Abdel-Basset, N Moustafa, H Hawash… - … learning techniques for …, 2022 - Springer
This chapter elaborates on different security aspects to be taken into accounts during the
development and the deployments of IoT architecture. To make the reader about the security …

[HTML][HTML] An efficient and robust method for data privacy and security on a public cloud using a novel hybrid technique

N Infantia Henry, C Anbuananth, S Kalarani - Engineering Proceedings, 2023 - mdpi.com
The end user has a cost-effective and cloud-based method of storing and retrieving their
personal information through remote access using some kind of network connectivity. The …

Secure and Efficient Web Services Recommendations using Data Science Techniques

PA Patel, YP Singh, SB Shinde… - 2024 5th International …, 2024 - ieeexplore.ieee.org
Secure and Efficient Web Service Recommendations performance is the breadth and depth
of this study. With the goal of recommending services to consumers that are highly relevant …