Cloud providers frequently utilize two tightly coupled resource management strategies like task scheduling & data replication to boost the performance of the system generally, guaranteeing service level agreement ...
详细信息
The rapid expansion of Internet of Things (IoT) devices and applications necessitates the need for more efficient computational and data management strategies. The Fog-enabled UAV-as-a-Service (FU-Serve) platform addr...
详细信息
In the traditional form of instruction, the teacher and pupil converse face to face. The discussion is started by the instructor, who generally discusses the material from the required textbooks. Many students might n...
详细信息
Distributed Denial of service (DDoS) attacks is an enormous threat to today's cyber world, cyber networks are compromised by the attackers to distribute attacks in a large volume by denying the service to legitima...
详细信息
Sensors are considered as important elements of electronic *** many applications and service,Wireless Sensor Networks(WSNs)are involved in significant data sharing that are delivered to the sink node in energy efficie...
详细信息
Sensors are considered as important elements of electronic *** many applications and service,Wireless Sensor Networks(WSNs)are involved in significant data sharing that are delivered to the sink node in energy efficient man-ner using multi-hop ***,the major challenge in WSN is the nodes are having limited battery resources,it is important to monitor the consumption rate of energy is very much ***,reducing energy con-sumption can increase the network lifetime in effective *** that,clustering methods are widely used for optimizing the rate of energy consumption among the sensor *** that concern,this paper involves in deriving a novel model called Improved Load-Balanced Clustering for Energy-Aware Routing(ILBC-EAR),which mainly concentrates on optimal energy utilization with load-balanced process among cluster heads and member *** providing equal rate of energy consumption among nodes,the dimensions of framed clusters are ***,the model develops a Finest Routing Scheme based on Load-Balanced Clustering to transmit the sensed information to the sink or base *** evaluation results depict that the derived energy aware model attains higher rate of life time than other works and also achieves balanced energy rate among head ***,the model also provides higher throughput and minimal delay in delivering data packets.
Multilevel thresholding plays a crucial role in image processing, with extensive applications in object detection, machine vision, medical imaging, and traffic control systems. It entails the partitioning of an image ...
详细信息
Payment channels are auspicious candidates in layer-2 solutions to reduce the number of on-chain transactions on traditional blockchains and increase transaction throughput. To construct payment channels, peers lock f...
详细信息
Technological advancements have brought a new era of growth for the healthcare industry. Nowadays, the security of healthcare data and the preservation of user privacy inside smart healthcare systems are being severel...
详细信息
One of the primary reasons of illness and mortality across the world is cardiovascular disease (CVD), for the timely detection of which the need for accurate detection methods persists. The last years have seen the de...
详细信息
Intrusion Detection and Prevention Systems (IDPS) play a key role in protecting networks by keeping an eye out for suspicious activity, spotting threats, and taking action to stop them. These systems were originally d...
详细信息
Intrusion Detection and Prevention Systems (IDPS) play a key role in protecting networks by keeping an eye out for suspicious activity, spotting threats, and taking action to stop them. These systems were originally designed for traditional, fixed networks, but they struggle to keep up with the fast-paced and constantly changing nature of cloud computing environments. Cloud computing has revolutionized technology, bringing many innovations in how organizations operate. Organizations rely heavily on the use of cloud storage to store and retrieve their sensitive data. Security issues in the cloud computing environment are a big challenge as, despite various protection measures, the cloud environment is vulnerable to security threats. Intrusion Detection and Prevention System (IDPS) is a significant component in securing the cloud environment against emerging threats in cyber-attacks. This paper takes a close look at intrusion detection systems (IDS) that are specifically built for cloud computing. The cloud brings its own set of challenges like constantly changing resources, sharing space between many users, and limited visibility into all the network traffic. Unlike traditional IDS that work in fixed, local networks, cloud-based IDS have to handle traffic that moves between virtual machines and scale up or down quickly. Cloud computing has transformed over time, improving access to scalability while offering vulnerabilities that increase the probability of intrusion or attacks. This review addresses these research gaps by comprehensively surveying state-of-the-art IDPS techniques tailored for cloud computing environments. IDPS is further classified into different categories, such as signature-based, anomaly-based, and hybrid-based. Recently, combining Machine Learning (ML) and Deep Learning (DL) with Intrusion Detection Systems (IDS) has shown to be very effective, as it allows for more precise detection and large-scale use. However, notable challenges include small
暂无评论