咨询与建议

限定检索结果

文献类型

  • 359 篇 会议
  • 103 篇 期刊文献
  • 2 册 图书
  • 1 篇 学位论文

馆藏范围

  • 465 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 217 篇 工学
    • 196 篇 计算机科学与技术...
    • 89 篇 电气工程
    • 66 篇 信息与通信工程
    • 38 篇 软件工程
    • 10 篇 控制科学与工程
    • 9 篇 电子科学与技术(可...
    • 4 篇 网络空间安全
    • 3 篇 石油与天然气工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 17 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
    • 1 篇 公共管理
  • 11 篇 理学
    • 6 篇 数学
    • 3 篇 化学
    • 2 篇 系统科学
    • 1 篇 生物学
  • 2 篇 法学
    • 1 篇 政治学
    • 1 篇 社会学
  • 2 篇 教育学
    • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 理论经济学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 军事学

主题

  • 465 篇 cloud computing ...
  • 100 篇 security
  • 96 篇 cloud computing
  • 68 篇 computational mo...
  • 58 篇 encryption
  • 36 篇 organizations
  • 32 篇 scalability
  • 28 篇 privacy
  • 27 篇 intrusion detect...
  • 27 篇 data security
  • 27 篇 data privacy
  • 27 篇 machine learning
  • 26 篇 data models
  • 24 篇 threat assessmen...
  • 23 篇 protocols
  • 23 篇 accuracy
  • 21 篇 authentication
  • 20 篇 computer archite...
  • 19 篇 monitoring
  • 19 篇 servers

机构

  • 4 篇 east china norma...
  • 4 篇 univ texas san a...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 2 篇 nanjing audit un...
  • 2 篇 school of comput...
  • 2 篇 pes univ pesit b...
  • 2 篇 univ melbourne d...
  • 2 篇 department of co...
  • 2 篇 abv indian inst ...
  • 2 篇 new jersey inst ...
  • 2 篇 iran univ sci & ...
  • 2 篇 department of cy...
  • 2 篇 chitkara centre ...
  • 2 篇 soongsil univ sc...
  • 2 篇 chitkara univers...
  • 2 篇 tek yantra inc c...
  • 2 篇 estrada consulti...
  • 2 篇 univ idaho dept ...
  • 2 篇 zhejiang sci tec...

作者

  • 5 篇 choo kim-kwang r...
  • 4 篇 dong xiaolei
  • 4 篇 agrawal neha
  • 4 篇 kohler jens
  • 4 篇 cao zhenfu
  • 4 篇 specht thomas
  • 4 篇 zhou jun
  • 4 篇 tapaswi shashika...
  • 3 篇 alpcan tansu
  • 3 篇 leckie christoph...
  • 3 篇 han yi
  • 3 篇 samy ganthan nar...
  • 3 篇 shahnawaz ahmad
  • 3 篇 albakri sameer h...
  • 3 篇 chan jeffrey
  • 2 篇 kim tai-hoon
  • 2 篇 yu huiming
  • 2 篇 isha batra
  • 2 篇 huang hai
  • 2 篇 attiya gamal

语言

  • 459 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"主题词=Cloud Computing Security"
465 条 记 录,以下是1-10 订阅
排序:
Periodic watermarking for copyright protection of large language models in cloud computing security
收藏 引用
COMPUTER STANDARDS & INTERFACES 2025年 94卷
作者: Ye, Pei-Gen Li, Zhengdao Yang, Zuopeng Chen, Pengyu Zhang, Zhenxin Li, Ning Zheng, Jun Beijing Inst Technol Sch Cyberspace Sci & Technol Beijing 100081 Peoples R China Guangzhou Univ Sch Artificial Intelligence Guangzhou 510006 Peoples R China Xidian Univ Sch Cyber Engn Xian 710006 Peoples R China
Large Language Models (LLMs) have become integral in advancing content understanding and generation, leading to the proliferation of Embedding as a Service (EaaS) within cloud computing platforms. EaaS leverages LLMs ... 详细信息
来源: 评论
Financial Data Sharing Based on cloud computing security: the Application and Effectiveness of Homomorphic Encryption Technology
Financial Data Sharing Based on Cloud Computing Security: th...
收藏 引用
IEEE International Conference on Big Data security on cloud (BigDatasecurity), High Performance and Smart computing (HPSC) and Intelligent Data and security (IDS)
作者: Ruiqi Rao Shanghai University of Finance and Economics Shanghai China
With the deep penetration of cloud computing in the financial industry, the convergence amount of financial data in the cloud continues to climb, and the problem of data security has become a bottleneck restricting th... 详细信息
来源: 评论
cloud computing security and Challenges: Issues, Threats, and Solutions  5
Cloud Computing Security and Challenges: Issues, Threats, an...
收藏 引用
5th Conference on cloud and Internet of Things (CIoT)
作者: Alrasheed, Sadeem Hamad Alhariri, Majid Aied Adubaykhi, Sulaiman Abdulaziz El Khediri, Salim Qassim Univ Dept Informat Technol Coll Comp Buraydah Saudi Arabia
cloud computing has become a point of interest to institutions, companies, and individuals because of the many advantages it provides, and its low-cost infrastructure, in addition to the ease of managing it and access... 详细信息
来源: 评论
cloud computing security: Fine-grained analysis and security approaches
Cloud Computing Security: Fine-grained analysis and Security...
收藏 引用
3rd National security Days (JNS)
作者: Alfath, Abdeladim Baina, Karim Baina, Salah Mohamed V Souissi Univ ENSIAS Rabat Morocco
cloud computing is a new paradigm for hosting and delivering services over the internet. In this paper, we aim to pinpoint the challenges and issue related to the cloud computing security and also to discuss some prom... 详细信息
来源: 评论
cloud computing security Case Studies and Research
Cloud Computing Security Case Studies and Research
收藏 引用
World Congress on Engineering (WCE 2013)
作者: Barron, Chimere Yu, Huiming Zhan, Justin N Carolina Agr & Tech State Univ Dept Comp Sci Greensboro NC 27411 USA
cloud computing is an emerging technological paradigm that provides a flexible and scalable information technology infrastructure to enable business agility. There are different vulnerabilities in cloud computing and ... 详细信息
来源: 评论
cloud computing security Analysis: Challenges and Possible Solutions
Cloud Computing Security Analysis: Challenges and Possible S...
收藏 引用
International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)
作者: Prakash, Chandan Dasgupta, Surajit Jadavpur Univ Dept Comp Sci & Engn Kolkata India
cloud computing is a Service Delivery Mechanism. computing resources are delivered as a service over the network. These services are Scalable, Autonomous, and Cost effective in nature. cloud computing is responsible f... 详细信息
来源: 评论
Emerging trends in cloud computing security: a bibliometric analyses
收藏 引用
IET SOFTWARE 2019年 第3期13卷 223-231页
作者: Garg, Deepak Sidhu, Jagpreet Rani, Shalli Chitkara Univ Inst Engn & Technol Chandigarh 140401 Punjab India Jaypee Univ Informat Technol Waknaghat Himachal Prades India
cloud computing (CC) has gained popularity in industry and academia. CC is implemented by the industries on a large scale. Still, a lot of efforts in research for cloud computing are required. Improving security helps... 详细信息
来源: 评论
Dynamical Propagation Model of Malware for cloud computing security
收藏 引用
IEEE ACCESS 2020年 8卷 20325-20333页
作者: Gan, Chenquan Feng, Qingdong Zhang, Xulong Zhang, Zufan Zhu, Qingyi Chongqing Univ Posts & Telecommun Sch Commun & Informat Engn Chongqing 400065 Peoples R China Shanxi Datong Univ Sch Comp & Network Engn Datong 037009 Peoples R China Chongqing Univ Posts & Telecommun Sch Cyber Secur & Informat Law Chongqing 400065 Peoples R China
cloud-fog-edge computing especially cloud computing is providing a variety of services in many areas around the world and plays a vital role in cyber-physical-social systems (CPSS). Particularly, virtualization is one... 详细信息
来源: 评论
Addressing cloud computing security issues
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID computing AND ESCIENCE 2012年 第3期28卷 583-592页
作者: Zissis, Dimitrios Lekkas, Dimitrios Univ Aegean Dept Product & Syst Design Engn Syros 84100 Greece
The recent emergence of cloud computing has drastically altered everyone's perception of infrastructure architectures, software delivery and development models. Projecting as an evolutionary step, following the tr... 详细信息
来源: 评论
A Systematic Literature Review on cloud computing security: Threats and Mitigation Strategies
收藏 引用
IEEE ACCESS 2021年 9卷 57792-57807页
作者: Alouffi, Bader Hasnain, Muhammad Alharbi, Abdullah Alosaimi, Wael Alyami, Hashem Ayaz, Muhammad Taif Univ Coll Comp & Informat Technol Dept Comp Sci At Taif 21944 Saudi Arabia Monash Univ Malaysia Sch Informat Technol Subang Jaya 47500 Malaysia Taif Univ Coll Comp & Informat Technol Dept Informat Technol At Taif 21944 Saudi Arabia
cloud computing has become a widely exploited research area in academia and industry. cloud computing benefits both cloud services providers (CSPs) and consumers. The security challenges associated with cloud computin... 详细信息
来源: 评论