Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Elizabeth Nathania Witanto"'
Publikováno v:
Sensors, Vol 23, Iss 12, p 5566 (2023)
The authors make the following corrections to the published paper [...]
Externí odkaz:
https://doaj.org/article/c3b37346d3424fae8e4f95af03e18248
Publikováno v:
Applied Sciences, Vol 13, Iss 11, p 6707 (2023)
The federated learning (FL) approach in machine learning preserves user privacy during data collection. However, traditional FL schemes still rely on a centralized server, making them vulnerable to security risks, such as data breaches and tampering
Externí odkaz:
https://doaj.org/article/11c19fbfef374625aca090e08ef43498
Publikováno v:
IoT, Vol 2, Iss 2, Pp 205-221 (2021)
Since the inception of the Internet of Things (IoT), we have adopted centralized architecture for decades. With the vastly growing number of IoT devices and gateways, this architecture struggles to cope with the high demands of state-of-the-art IoT s
Externí odkaz:
https://doaj.org/article/b7aebe16466e4635802f86ba3969dce2
Publikováno v:
Sensors, Vol 23, Iss 3, p 1623 (2023)
Most existing data integrity auditing protocols in cloud storage rely on proof of probabilistic data possession. Consequently, the sampling rate of data integrity verification is low to prevent expensive costs to the auditor. However, in the case of
Externí odkaz:
https://doaj.org/article/4a5e250e72d0414d8412124abf5d20ea
Publikováno v:
Applied Sciences, Vol 12, Iss 17, p 8602 (2022)
Cloud computing brings convenience to the users by providing computational resources and services. However, it comes with security challenges, such as unreliable cloud service providers that could threaten users’ data integrity. Therefore, we need
Externí odkaz:
https://doaj.org/article/1d744bc83d3349beb396bdd412849c51
Publikováno v:
Symmetry, Vol 14, Iss 2, p 273 (2022)
AI has been implemented in many sectors such as security, health, finance, national defense, etc. However, together with AI’s groundbreaking improvement, some people exploit AI to do harmful things. In parallel, there is rapid development in cloud
Externí odkaz:
https://doaj.org/article/36cf6285890841baae01f42594e80b08
Publikováno v:
Applied Sciences, Vol 10, Iss 19, p 6744 (2020)
As the usage growth rate of Internet of Things (IoT) devices is increasing, various issues related to these devices need attention. One of them is the distribution of the IoT firmware update. The IoT devices’ software development does not end when
Externí odkaz:
https://doaj.org/article/25efa966cdf142958008414a62c59cb3
Publikováno v:
Symmetry; Volume 14; Issue 2; Pages: 273
AI has been implemented in many sectors such as security, health, finance, national defense, etc. However, together with AI’s groundbreaking improvement, some people exploit AI to do harmful things. In parallel, there is rapid development in cloud
Publikováno v:
Applied Sciences; Volume 12; Issue 17; Pages: 8602
Cloud computing brings convenience to the users by providing computational resources and services. However, it comes with security challenges, such as unreliable cloud service providers that could threaten users’ data integrity. Therefore, we need
Publikováno v:
Proceedings of International Conference on Smart Computing and Cyber Security ISBN: 9789811579899
Improper configuration of web applications or servers can lead to various security flaws. Security misconfiguration is ranked number 6 on the OWASP top 10 2017 list, meaning it is a critical risk in web applications that web developers need to focus
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3ad9f5e0c9e57b38e4b5c805b8aec8f5
https://doi.org/10.1007/978-981-15-7990-5_8
https://doi.org/10.1007/978-981-15-7990-5_8