How Can Organizations Prevent Cyber Attacks Using Proper Cloud Computing Security?

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Future Technologies Conference (6. : 2021 : Online) Proceedings of the Future Technologies Conference (FTC) 2021 ; Volume 3
1. Verfasser: Bahkali, Ismail Mohammed (VerfasserIn)
Weitere Verfasser: Semwal, Sudhanshu Kumar (VerfasserIn)
Pages:2021
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Double-Extortion Ransomware: A Technical Analysis of Maze Ransomware 2022 Kerns, Quintin
Patterns in Malware Attacks Leveraging COVID-19 Pandemic Fears 2022 Norris, Jason H.
Advancement on Security Applications of Private Intersection Sum Protocol 2022 Raghuvir, Y. Athur
Efficient Secret Sharing-Based Partial Matching Search Using Error Correction Code 2022 Iwamura, Keiichi
A CRYSTALS-Dilithium Response-Based Cryptography Engine Using GPGPU 2022 Wright, Jordan
Quantum Computing and Its Application in Cryptography 2022 Yung, Choi Tim Antony
Gray Matters and Complex Systems: Mind, Consciousness, and Attention 2022 Semwal, Sudhanshu Kumar
A Novel Artificial Intelligence Technique for Cloud Computing Using a New Heuristic Initialisation and PSO-Parallel Execution 2022 Chraibi, Amine
Enabling Extreme High-Throughput Multi-precision Computing on General-Purpose Microprocessor 2022 Xu, Lei
Content Agnostic Game Engineering: Impact of Stealth Assessment and Content Order on Player Engagement 2022 Verma, Vipin
Towards an Agile Quality Management Model for Microservice Architecture in FinTech 2022 Nguyen, Vu H. A.
Viktoria: A New Architecture for Hash Functions 2022 da Silva, Edimar Veríssimo
An ICT-Based Teaching Strategy to Promote Communicative Interactions: An Online Learning Approach During the COVID-19 Pandemic 2022 Arango-Vásquez, Sandra Isabel
Recent Trends in Software Development: Low-Code Solutions 2022 Benac, Ryan
Is BIM Too Detailed for Conceptual Designing? A Case Study 2022 Abdelhameed, Wael
Method for Web: GIS System Applicable to Assimilation Model Database Constructions 2022 Arai, Kohei
Virtual Reality and Motion Capture Training 2022 Omowonuola, Victor
Hybrid Firefly and Swarm Algorithms for Breast Cancer Mammograms Classification Based on Rough Set Theory Features Selection 2022 Farouk, R. M.
Information Sharing in the Presence of Adversarial Nodes Using Raft 2022 Zamir, Linir
How Can Organizations Prevent Cyber Attacks Using Proper Cloud Computing Security? 2022 Bahkali, Ismail Mohammed
Alle Artikel auflisten