2016
DOI: 10.14257/ijgdc.2016.9.7.02
|View full text |Cite
|
Sign up to set email alerts
|

Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Computing

Abstract: Cloud computing has attracted users due to high speed and bandwidth of the internet.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
5

Relationship

3
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…In the future work, we intend to extend research by changing the preprocessing approaches and image segmentation for Decision Tree J48 and the Naïve Bayes Tree, in order to improve the accuracy rate to the level of k-Nearest Neighbor in offline signatures. Research will also focus on the signatures used in security systems [42].…”
Section: Discussionmentioning
confidence: 99%
“…In the future work, we intend to extend research by changing the preprocessing approaches and image segmentation for Decision Tree J48 and the Naïve Bayes Tree, in order to improve the accuracy rate to the level of k-Nearest Neighbor in offline signatures. Research will also focus on the signatures used in security systems [42].…”
Section: Discussionmentioning
confidence: 99%
“…This type of connectivity is known as the Internet of Things (IoT) [1,2]. Security, connectivity, privacy, and standard procedures for communication in IoT-based networks are the biggest concerns nowadays [3]. Researchers are trying to resolve these concerns so that IoT-based networks can be successfully utilized in the real environment [4].…”
Section: Introductionmentioning
confidence: 99%
“…And is available to the customers, furthermore, including desktops and convenient PCs, sensors, and so forth. With the "cloud" as an allegory for the internet [1], distributed computing guarantees to convey exceedingly adaptable ITempowered information, programming, and equipment capacities as support of outside customers with the internet.…”
Section: Introductionmentioning
confidence: 99%