Towards an intelligent intrusion detection system to detect malicious activities in cloud computing
Several sectors have embraced Cloud Computing (CC) due to its inherent characteristics,
such as scalability and flexibility. However, despite these advantages, security concerns …
such as scalability and flexibility. However, despite these advantages, security concerns …
Lightweight integrity preserving scheme for secure data exchange in cloud-based IoT systems
The information obtained from external sources within the cloud and the resulting
computations are not always reliable. This is attributed to the absence of tangible …
computations are not always reliable. This is attributed to the absence of tangible …
Global-local attention-based butterfly vision transformer for visualization-based malware classification
In recent studies, convolutional neural networks (CNNs) are mostly used as dynamic
techniques for visualization-based malware classification and detection. Though vision …
techniques for visualization-based malware classification and detection. Though vision …
Research trends in deep learning and machine learning for cloud computing security
Deep learning and machine learning show effectiveness in identifying and addressing cloud
security threats. Despite the large number of articles published in this field, there remains a …
security threats. Despite the large number of articles published in this field, there remains a …
DBCT-Net: A dual branch hybrid CNN-transformer network for remote sensing image fusion
Q Wang, X **, Q Jiang, L Wu, Y Zhang… - Expert Systems with …, 2023 - Elsevier
Remote sensing image fusion aims at fusing high spatial resolution single-band
panchromatic (PAN) image with spectrally informative multispectral (MS) image to generate …
panchromatic (PAN) image with spectrally informative multispectral (MS) image to generate …
Mobile Cloud Computing Paradigm: A Survey of Operational Concerns, Challenges and Open Issues
ABSTRACT The Mobile Cloud Computing paradigm has revolutionized the concepts of
mobile computing and the Internet of Things (IoT). This paradigm allows outsourcing the …
mobile computing and the Internet of Things (IoT). This paradigm allows outsourcing the …
Hybrid feature extraction and integrated deep learning for cloud-based malware detection
The escalating prevalence of malware necessitates a proactive and vigilant approach to its
detection and mitigation. The ramifications of a successful malware attack on cloud services …
detection and mitigation. The ramifications of a successful malware attack on cloud services …
An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework
Security in e-healthcare applications such as Telemedicine is crucial in safeguarding
patients' sensitive data during transmission. The proposed system measures the patient's …
patients' sensitive data during transmission. The proposed system measures the patient's …
MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer
The proliferation of malware has exhibited a substantial surge in both quantity and diversity,
posing significant threats to the Internet and indispensable network applications. The …
posing significant threats to the Internet and indispensable network applications. The …
An intelligent protection framework for intrusion detection in cloud environment based on covariance matrix self-adaptation evolution strategy and multi-criteria …
The security defenses that are not comparable to sophisticated adversary tools, let the cloud
as an open environment for attacks and intrusions. In this paper, an intelligent protection …
as an open environment for attacks and intrusions. In this paper, an intelligent protection …