Essays about: "Literature review cloud security"
Showing result 1 - 5 of 36 essays containing the words Literature review cloud security.
-
1. Technology Acceptance for AI implementations : A case study in the Defense Industry about 3D Generative Models
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Advancements in Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) has emerged into 3D object creation processes through the rise of 3D Generative Adversarial Networks (3D GAN). These networks contain 3D generative models capable of analyzing and constructing 3D objects. READ MORE
-
2. Assessing Practices of Cloud Storage Security Among Users : A Study on Security Threats in Storage as a Service Environment
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : With the immense amount of data generated daily, relying solely on physical storage is insufficient. Therefore, Cloud services have become a big part of our day-to-day life, as they allow users to store data and relieve customers from the burden of maintenance. READ MORE
-
3. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE
-
4. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. READ MORE
-
5. How is it possible to calculate IT security effectiveness?
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : In IT Security world, there is lack of available, reliable systems for measuring securitylevels/posture. They lack the range of quantitative measurements and easy and fast deployment,and potentially affects companies of all sizes. READ MORE