2017
DOI: 10.3103/s0005105517020029
|View full text |Cite
|
Sign up to set email alerts
|

On some artificial intelligence methods and technologies for cloud-computing protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Grusho et al [80] discussed AI methods and models to solve information security problems. The most significant security threats to CC environments are the abusive and malicious use of cloud services computing, architectural limitations to cloud infrastructure access, and the dynamic nature of CC environments.…”
Section: Discussion and Lessons Learnedmentioning
confidence: 99%
See 2 more Smart Citations
“…Grusho et al [80] discussed AI methods and models to solve information security problems. The most significant security threats to CC environments are the abusive and malicious use of cloud services computing, architectural limitations to cloud infrastructure access, and the dynamic nature of CC environments.…”
Section: Discussion and Lessons Learnedmentioning
confidence: 99%
“…They discussed how to achieve moderation for distributed computing security risks as an essential advance toward acquiring a safe condition for distributed computing. In Reference [80], the advantage is to provide parallel processing capability and the disadvantage is increase computational cost. In Reference [76], the advantage is efficient data handling and the disadvantages are time and space issues.…”
Section: Discussion and Lessons Learnedmentioning
confidence: 99%
See 1 more Smart Citation
“…The patient's therapy will be difficult if someone else handles and obtains this information. [18] Risks to transparency, panel expansion's effects, organizational inaccessibility, external equipment disruption, and insufficient recovery methods are some of the threats to availability. First, attention has been drawn to the board, which also includes the results of basic adjustments and the implications of different consumers' entrance into test customers.…”
Section: Figure1 Security Threats In Cloud Computingmentioning
confidence: 99%
“…The most important one is the security [57] . Many techniques in AI, such as decision tree [58] and deep learning [59] , have been successfully applied to detect distributed denial of service (DDoS). AI also helps to improve the reliability of cloud authentication, which can further prevent data leaks and unauthorized use of services [60] .…”
Section: Ai and Cloud Computingmentioning
confidence: 99%