2022 International Conference on Cyber Resilience (ICCR) 2022
DOI: 10.1109/iccr56254.2022.9996066
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis for Virtual Machine Allocation in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…The integration of cloud technology and wearable computing has been an active area of research and development in recent years, and there has been a growing body of literature exploring various aspects of these interactions [3]. Some of the key areas of focus include Cloud-based wearable applications: Researchers have been exploring the use of cloud technology to support various applications on wearable devices, such as health monitoring, fitness tracking, and entertainment.Wearable-cloud integration: Researchers have been investigating ways to optimize the interaction between wearable devices and cloud-based services, such as improving data transfer and synchronization, reducing latency, and enhancing security [4].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The integration of cloud technology and wearable computing has been an active area of research and development in recent years, and there has been a growing body of literature exploring various aspects of these interactions [3]. Some of the key areas of focus include Cloud-based wearable applications: Researchers have been exploring the use of cloud technology to support various applications on wearable devices, such as health monitoring, fitness tracking, and entertainment.Wearable-cloud integration: Researchers have been investigating ways to optimize the interaction between wearable devices and cloud-based services, such as improving data transfer and synchronization, reducing latency, and enhancing security [4].…”
Section: Related Workmentioning
confidence: 99%
“…However, the integration of cloud technology and wearable computing also presents a number of challenges and technical issues that must be addressed. For example, the transfer of large amounts of data between wearable devices and cloud-based resources can be slow and unreliable, leading to delays and disruptions in the user experience [3].In addition, the security of sensitive personal data stored and processed in the cloud is a major concern, and must be addressed to ensure user privacy and data protection. Despite these challenges, the future of cloud technology and wearable computing interaction is bright, with ongoing research and development in this field poised to deliver new innovations and breakthroughs in the years to come [4].…”
Section: Introductionmentioning
confidence: 99%
“…Deep learning, a subfield of artificial intelligence, has shown great promise in addressing these challenges. The ability of deep learning algorithms to automatically learn complex representations of data and adapt to new and evolving threats makes them ideal for detecting malware attacks [3]. Malware is a kind of suspicious software used by cyber thieves to steal data and destroy systems to obtain unauthorized access to the entire system or an individual's account.…”
Section: Malware Attacks Detection In Network Security Using Deepmentioning
confidence: 99%
“…Tariang [2], as a result of the exponential growth There is a range of ways to protect mobile devices against malware penetration, according to Seyed Mehdi Shahidi and his fellow researchers [3], but many of them miss the accuracy needed to detect Trojan infection.…”
Section: Related Workmentioning
confidence: 99%
“…The review looked at protocols such as AES, PKI and SAML, as well as data leakage prevention methods, authentication protocols, and threat detection solutions. The authors concluded that these mechanisms can be effective in protecting data from unauthorized access and disclosure, while also providing assurance of trustworthiness [16].…”
Section: Introductionmentioning
confidence: 99%