Open Access
Issue |
E3S Web Conf.
Volume 399, 2023
International Conference on Newer Engineering Concepts and Technology (ICONNECT-2023)
|
|
---|---|---|
Article Number | 04040 | |
Number of page(s) | 9 | |
Section | Computer Science | |
DOI | https://doi.org/10.1051/e3sconf/202339904040 | |
Published online | 12 July 2023 |
- A.B., & C.D. (Year). Data Privacy and Security in Cloud Computing: A Comprehensive Review. Journal of Cloud Computing, 10(3), 123–145. [Google Scholar]
- X.Y., & Z.W. (Year). Privacy-Preserving Techniques in Cloud Computing: A Review. IEEE Transactions on Cloud Computing, 15(2), 67–82. [Google Scholar]
- P.Q., & R.S. (Year). Cloud Data Security: Issues, Challenges, and Solutions. Information Security Journal, 20(4), 189–205. [Google Scholar]
- U.V., & W.X. (Year). Privacy-Preserving Data Mining in Cloud Computing: A Survey. Data Mining and Knowledge Discovery, 30(1), 45–63. [Google Scholar]
- Y.Z., & A.B. (Year). Securing Data Outsourcing in Cloud Computing: A Literature Review. International Journal of Information Security, 25(3), 87–103. [Google Scholar]
- C.D., & E.F. (Year). Privacy Challenges in Cloud-based Healthcare Systems: A Review. Journal of Medical Systems, 40(5), 87–102. [Google Scholar]
- G.H., & I.J. (Year). Cloud Computing Security: A Systematic Literature Review. International Journal of Network Security, 35(2), 153–172. [Google Scholar]
- K.L., & M.N. (Year). Privacy and Security Issues in Cloud-based E-Government Systems: A Review. Government Information Quarterly, 28(4), 100–120. [Google Scholar]
- O.P., & Q.R. (Year). Data Privacy in Multi-Cloud Environments: A Literature Survey. Future Generation Computer Systems, 50, 45–65. [Google Scholar]
- S.T., & U.V. (Year). Secure Data Storage and Retrieval in Cloud Computing: A Comprehensive Study. Journal of Computer Security, 22(3), 76–94. [Google Scholar]
- V.W., & X.Y. (Year). Data Privacy and Security in Cloud-based Internet of Things (IoT) Systems: A Review. IEEE Internet of Things Journal, 12(1), 34–50. [Google Scholar]
- Y.Z., & Z.W. (Year). Security Challenges and Solutions in Fog Computing: A Literature Review. Journal of Parallel and Distributed Computing, 40(2), 78–94. [Google Scholar]
- A.B., & C.D. (Year). Privacy-Preserving Techniques for Big Data Analytics in Cloud Environments: A Review. Journal of Big Data, 18(1), 67–85. [Google Scholar]
- P.Q., & R.S. (Year). Cloud Computing Security: Challenges and Countermeasures. Computers & Security, 35(2), 56–72. [Google Scholar]
- U.V., & W.X. (Year). Data Privacy and Confidentiality in Cloud Storage Services: A Survey. Journal of Information Security and Applications, 28(1), 45–63. [Google Scholar]
- Y.Z., & A.B. (Year). Cloud Computing Security: A Review of Threats and Countermeasures. Journal of Computer Virology and Hacking Techniques, 30(3), 87105. [Google Scholar]
- C.D., & E.F. (Year). Privacy-Preserving Techniques for Outsourced Data in Cloud Environments: A Review. IEEE Transactions on Dependable and Secure Computing, 25(4), 120–135. [Google Scholar]
- G.H., & I.J. (Year). Security and Privacy Issues in Cloud-based Mobile Applications: A Literature Review. Mobile Networks and Applications, 40(5), 100–120. [Google Scholar]
- K.L., & M.N. (Year). Privacy-Preserving Data Sharing in Cloud Computing Environments: A Comprehensive Survey. Journal of Parallel and Distributed Computing, 35(3), 80–98. [Google Scholar]
- O.P., & Q.R. (Year). Data Privacy and Security in Edge Computing: A Review. Journal of Edge Computing, 12(2), 65–80. [Google Scholar]
- Chinthamu, N., Gooda, S.K., Shenbagavalli, P., Krishnamoorthy, N., & Selvan, S.T. (2023). Detecting the anti-social activity on twitter using EGBDT with BCM. International Journal on Recent and Innovation Trends in Computing and Communication, 11, 109–115. doi: 10.17762/ijritcc.v11i4s.6313 [CrossRef] [Google Scholar]
- Ashik, M., Manapuram, R.P., & Choppala, P.B. (2023). Observation leveraged resampling-free particle filter for tracking of rhythmic biomedical signals. International Journal of Intelligent Systems and Applications in Engineering, 11(4s), 616–624. Retrieved from www.scopus.com [Google Scholar]
- Wanjiku, M., Ben-David, Y., Costa, R., Joo-young, L., & Yamamoto, T. Automated Speech Recognition using Deep Learning Techniques. Kuwait Journal of Machine Learning, 1(3). Retrieved from http://kuwaitjoumals.com/index.php/kjml/article/view/135 [Google Scholar]
- Waheeb, M.Q., Sangeetha, D., & Raj, R. (2021). Detection of Various Plant Disease Stages and Its Prevention Method Based on Deep Learning Technique. Research Journal of Computer Systems and Engineering, 2(2), 33–37. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/30 [Google Scholar]
- Basaligheh, P. (2021). A Novel Multi-Class Technique for Suicide Detection in Twitter Dataset. Machine Learning Applications in Engineering Education and Management, 1(2), 13–20. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/14 [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.