Jamali et al., 2022 - Google Patents
The Design, Use and Impact of Cloud Computing During the Covid-19 CrisesJamali et al., 2022
View PDF- Document ID
- 2324892582762745098
- Author
- Jamali M
- Kansro N
- Chandio S
- Rajper G
- Shah S
- Publication year
- Publication venue
- VFAST Transactions on Software Engineering
External Links
Snippet
The incidence and severity of cybercrime have increased recently, and worries about personal data protection are widespread. Cybercriminals are taking advantage of the COVID- 19 pandemic's crucial reliance on cloud computing emerging virtual environments by …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2016220152B2 (en) | Cloud encryption key broker apparatuses, methods and systems | |
Kumar | Guardians of Trust: Navigating Data Security in AIOps through Vendor Partnerships | |
Nowroozi et al. | Cryptocurrency wallets: assessment and security | |
Vishwakarma et al. | Designing a cryptosystem for data at rest encryption in mobile payments | |
Jamali et al. | The Design, Use and Impact of Cloud Computing During the Covid-19 Crises | |
Chopra et al. | The need for information security | |
Joshi et al. | A survey on various security issues and challenges to secure cloud computing | |
Stanislav | Economic aspects of Big Data: analysis of data privacy protection methods | |
Salama et al. | Mobile cloud computing and the internet of things security and privacy | |
Uloli et al. | Requirements analysis of security and privacy of mobile payments-Indian context | |
Mitropoulos et al. | PDGuard: an architecture for the control and secure processing of personal data | |
Iqbal et al. | Managing Security Risks in Post-Trade Matching and Confirmation Using CorDapp | |
Bian et al. | Research on the Privacy Security and Defense Strategies on the Internet of Things Platform | |
Mupila et al. | An Innovative Authentication Model for the Enhancement of Cloud Security | |
Haunts et al. | What Are Data Breaches? | |
Mishra et al. | A Regulatory Framework for Improving E-banking Security | |
Ahuja et al. | Emerging Technologies in E-Commerce Security | |
Amamou et al. | Towards a Better Security in Public Cloud Computing | |
Sivabalan et al. | Securing Sensitive Web Based Student Academic Performance System with Base64 Encoding and Systematic Mirroring | |
Rajput et al. | Addressing Security and Privacy Concerns in Cloud-Based Deep Learning Systems | |
Winterberg | Cybersecurity: Hitting a Moving Target. | |
Gunawan et al. | E-commerce Security Issues for SMEs: A Systematic Literature Review | |
Kapis et al. | Security Modeling for Protecting Electronic Patients' Consent. | |
Shahapasand et al. | Blockchain for a secured and forensically sound internet of things | |
Giyosjon et al. | SAFEGUARDING THE DIGITAL FRONTIER: EXPLORING MODERN CYBERSECURITY METHODS |