Security in cloud computing: Methods for ensuring privacy and integration in modern applications
O Zarichuk - Development Management, 2024 - devma.com.ua
Cloud computing has become a necessary component for data storage and processing and
is becoming more widespread. However, there are threats to the security and privacy of user …
is becoming more widespread. However, there are threats to the security and privacy of user …
Privacy Preservation and Cloud Computing
RK Patel, P Gidwani, NR Patel - … and Secured Data Storage in Cloud …, 2023 - igi-global.com
As the organization moves to cloud computing to take advantage of lower cost and higher
efficiencies and availability, privacy and confidentiality concerns remain a challenge …
efficiencies and availability, privacy and confidentiality concerns remain a challenge …
Personalization and Customer Experience in the Era of Data‐Driven Marketing
The importance of personalization and the customer experience in contemporary data‐
driven marketing techniques is explored in this book chapter. Businesses now have access …
driven marketing techniques is explored in this book chapter. Businesses now have access …
Revolutionizing Cybersecurity: Intelligent Malware Detection Through Deep Neural Networks
MS Dawood - 2024 - philpapers.org
With the proliferation of sophisticated cyber threats, traditional malware detection techniques
are becoming inadequate to ensure robust cybersecurity. This study explores the integration …
are becoming inadequate to ensure robust cybersecurity. This study explores the integration …
A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity
P Selvaprasanth - 2024 - philpapers.org
With the proliferation of sophisticated cyber threats, traditional malware detection techniques
are becoming inadequate to ensure robust cybersecurity. This study explores the integration …
are becoming inadequate to ensure robust cybersecurity. This study explores the integration …
Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques
S Yoheswari - 2024 - philpapers.org
With the proliferation of sophisticated cyber threats, traditional malware detection techniques
are becoming inadequate to ensure robust cybersecurity. This study explores the integration …
are becoming inadequate to ensure robust cybersecurity. This study explores the integration …
AI-Driven Air Quality Forecasting Using Multi-Scale Feature Extraction and Recurrent Neural Networks
P Selvaprasanth - 2024 - philpapers.org
We investigate the application of Convolutional Neural Networks (CNN), Long Short-Term
Memory (LSTM) networks, and a hybrid CNN-LSTM model for forecasting air pollution levels …
Memory (LSTM) networks, and a hybrid CNN-LSTM model for forecasting air pollution levels …
Evaluating Advanced Deep Learning Methods for Regional Air Quality Index Forecasting
MS Dawood - 2024 - philpapers.org
We investigate the application of Convolutional Neural Networks (CNN), Long Short-Term
Memory (LSTM) networks, and a hybrid CNN-LSTM model for forecasting air pollution levels …
Memory (LSTM) networks, and a hybrid CNN-LSTM model for forecasting air pollution levels …
ntelligent Hybrid Cloud Data Deduplication for Optimized Storage Utilization
AM Prabaharan - 2024 - philpapers.org
The framework leverages a hybrid cloud architecture, combining the scalability of public
clouds with the security of private clouds. By employing a combination of client-side hashing …
clouds with the security of private clouds. By employing a combination of client-side hashing …
Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures
MS Dawood - 2024 - philpapers.org
The exponential growth of data storage requirements has become a pressing challenge in
hybrid cloud environments, necessitating efficient data deduplication methods. This …
hybrid cloud environments, necessitating efficient data deduplication methods. This …