Essays about: "Literature review cloud security"

Showing result 1 - 5 of 36 essays containing the words Literature review cloud security.

  1. 1. Technology Acceptance for AI implementations : A case study in the Defense Industry about 3D Generative Models

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Michael Arenander; [2023]
    Keywords : Technology Acceptance; Artificial Intelligence; Machine Learning; 3D Generative Models; Innovation; Teknisk Acceptans; Artificiell Intelligens; Maskininlärning; 3D Generativa Modeller; Innovation;

    Abstract : Advancements in Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) has emerged into 3D object creation processes through the rise of 3D Generative Adversarial Networks (3D GAN). These networks contain 3D generative models capable of analyzing and constructing 3D objects. READ MORE

  2. 2. Assessing Practices of Cloud Storage Security Among Users : A Study on Security Threats in Storage as a Service Environment

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Hugo Joo Jonsson; Vilgot Karlsson; [2023]
    Keywords : Cloud Computing; Storage-as-a-Service; Security threats; Security practices;

    Abstract : With the immense amount of data generated daily, relying solely on physical storage is insufficient. Therefore, Cloud services have become a big part of our day-to-day life, as they allow users to store data and relieve customers from the burden of maintenance. READ MORE

  3. 3. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE

  4. 4. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Abdulrahman Al Allaf; Waseem Totonji; [2023]
    Keywords : Internet of Things; IoT security; IoT threats; IoT attacks; Digital forensics; IoT forensic; IoT forensic challenges; Cloud forensics; Network forensics;

    Abstract : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. READ MORE

  5. 5. How is it possible to calculate IT security effectiveness?

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Kristjan Kivimaa; [2022]
    Keywords : Security effectiveness; IT security;

    Abstract : In IT Security world, there is lack of available, reliable systems for measuring securitylevels/posture. They lack the range of quantitative measurements and easy and fast deployment,and potentially affects companies of all sizes. READ MORE