2022
DOI: 10.1007/978-3-031-03918-8_7
|View full text |Cite
|
Sign up to set email alerts
|

Steganography Adaptation Model for Data Security Enhancement in Ad-Hoc Cloud Based V-BOINC Through Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Numerous industries, including healthcare, use machine learning to anticipate diseases including COVID19, osteoporosis, and schistosomiasis.Regarding security evaluation, the performance of recognition and detection is still a problem, as seen with DDoS attacks and blockchain. Numerous research have employed classification algorithms with the goal of identifying and resolving the DDoS attack.DDoS assaults are simple to carry out by making use of network vulnerabilities and software service demands [6].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Numerous industries, including healthcare, use machine learning to anticipate diseases including COVID19, osteoporosis, and schistosomiasis.Regarding security evaluation, the performance of recognition and detection is still a problem, as seen with DDoS attacks and blockchain. Numerous research have employed classification algorithms with the goal of identifying and resolving the DDoS attack.DDoS assaults are simple to carry out by making use of network vulnerabilities and software service demands [6].…”
Section: Introductionmentioning
confidence: 99%
“…There are five distinct classes in this data set: Normal, DoS, R2L, U2R, and Probes. There are 5,092 and 6,890 records for the training and test, respectively[6]. Our initial research goal was to eliminate as many variables as possible.…”
mentioning
confidence: 99%
“… The end-user implies a consistent level of trust towards the volunteer resources and grid systems; as there is no existence for a trust relation between the infrastructure system and the end user. Business continuity can be provided through a group of unreliable nodes, the ad-hoc cloud system provides the availability for both host and guest users within the ad-hoc cloud system in case any failure case occurred periodically [ 7 ]. The operated host processes –regardless the resources’ consumption level- were not affected by any means with the ad-hoc cloud system over the passing time.…”
Section: Introductionmentioning
confidence: 99%
“…Business continuity can be provided through a group of unreliable nodes, the ad-hoc cloud system provides the availability for both host and guest users within the ad-hoc cloud system in case any failure case occurred periodically [ 7 ].…”
Section: Introductionmentioning
confidence: 99%