Читать книгу Deep Learning Approaches to Cloud Security - Группа авторов - Страница 40

References

Оглавление

1. Abhishek Kumar & Jyotir Moy Chatterjee & Pramod Singh Rathore, 2020. “Smartphone Confrontational Applications and Security Issues,” International Journal of Risk and Contingency Management (IJRCM), IGI Global, vol. 9(2), pages 1-18, April.

2. Bhargava, N., Bhargava, R., Rathore, P. S., & Kumar, A. (2020). Texture Recognition Using Gabor Filter for Extracting Feature Vectors With the Regression Mining Algorithm. International Journal of Risk and Contingency Management (IJRCM), 9(3), 31-44. doi:10.4018/IJRCM.2020070103

3. By Judith Hurwitz https://www.dummies.com/programming/cloud-computing/hybrid-cloud/multi-tenancy-and-its-benefits-in-a-saas-cloud-computing-environment/ by Judith Hurwitz, Marcia Kaufman, Fern Halper, Daniel Kirsch

4. https://www.dummies.com/programming/cloud-computing/hybrid-cloud/multi-tenancy-and-its-benefits-in-a-saas-cloud-computing-environment/

5. Computer term http://whatis.techtarget.com/definitionmulti-tenancy Frederick Chong https://msdn.microsoft.com/en-us/library/aa479086.aspx

6. https://www.researchgate.net/publication/311922746

7. Kumar, A., Chatterjee, J. M., & Díaz, V. G. (2020). A novel hybrid approach of svm combined with nlp and probabilistic neural network for email phishing. International Journal of Electrical and Computer Engineering, 10(1), 486

8. Margaret Rouse https://searchcloudcomputing.techtarget.com/definition/multi-tenant-cloud.

9. Multi tenancy in SaaS-PaaS http://multitenancy-in-saaspaas.wikispaces.asu.edu/

10. Naveen Kumar, Prakarti Triwedi, Pramod Singh Rathore, “An Adaptive Approach for image adaptive watermarking using Elliptical curve cryptography (ECC)”, First International Conference on Information Technology and Knowledge Management pp. 89–92, ISSN 2300-5963 ACSIS, Vol. 14 DOI: 10.15439/2018KM19.

11. Rathore, P.S., Chatterjee, J.M., Kumar, A. et al. Energy-efficient cluster head selection through relay approach for WSN. J Supercomputer (2021). https://doi.org/10.1007/s11227-020-03593-4

12. Shildshare.net//www.slideshare.net/mmubashirkhan/saa-s-multitenant database- architecture

13. Singh Rathore, P., Kumar, A., & Gracia-Diaz, V. (2020). A Holistic Methodology for Improved RFID Network Lifetime by Advanced Cluster Head Selection using Dragonfly Algorithm. International Journal Of Interactive Multimedia And Artificial Intelligence, 6 (Regular Issue), http://doi.org/10.9781/ijimai.2020.05.003.

14. www.elsevier.com/locate/knosys

15. www.researchgate.net/publication/320185699

16. Thangapandiyan, M., Anand, P.M., & Sankaran, K. (2018). Quantum Key Distribution and Cryptography Mechanisms for Cloud Data Security. 2018 International Conference on Communication and Signal Processing (ICCSP), 1031-1035.

Deep Learning Approaches to Cloud Security

Подняться наверх