1774 | Study-on-Construction-of-Radio-Monitoring-System-Based-on-Cloud-Edge-Device | IEEE-2023 |
1773 | Secure-and-Efficient-Data-Integrity-Verification-Scheme-for-Cloud-Data-Storage | IEEE-2023 |
1772 | Cloud-based-E-Feedback-System-for-Hospitality-Industry | IEEE-2023 |
1771 | Design-of-cloud-based-video-sharing-platform-using-Machine-Learning | IEEE-2023 |
1770 | Enabling-Balanced-Data-Deduplication-in-Mobile-Edge-Computing | IEEE-2023 |
1769 | The-Role-and-Potential-Applications-of-Cloud-Computing-in-the-Banking-Industry | IEEE-2023 |
1768 | Global-Identification-Passport:-A-Unique-Cloud-based-Passport-Model | IEEE-2023 |
1767 | An-evaluation-on-E-learning-with-Cloud-Computing | IEEE-2023 |
1766 | A-Review-on-Adoption-of-Green-Cloud-Computing | IEEE-2023 |
1765 | Software-Re-Engineering-using-Cloud-Computing-Platform | IEEE-2023 |
1553 | UNTRACEABLE-GROUP-DATA-SHARING-USING-AES-IN-NETWORK-SECURITY | NON IEEE -2022 |
1552 | MAINTAINING-SEARCH-OVER-ENCRYPTED-DATA-AND-DATA-INTEGRITY-EVALUATION-IN-CLOUD | NON IEEE -2022 |
1551 | DATA-STORAGE-SECURITY-IN-CLOUD-COMPUTING | NON IEEE -2022 |
1548 | A-PROFICIENT-PRIVACY-PROTECTION-METHOD-FOR-CLOUD-COMPUTING | NON IEEE -2022 |
1516 | FACE-RECOGNITION-IN-SOCIAL-NETWORKS-USING-BIG-DATA | NON IEEE -2022 |
1430 | ONLINE-VOTING-SYSTEM-USING-CLOUD-COMPUTING | NON IEEE-2022 |
1269 | Development-of-cloud-recognition-system-for-ground-based-cloud-images-based-on-machine-vision | IEEE-2021 |
1268 | Application-of-Artificial-Intelligence-System-in-Smart-Education-in-Cloud-Environment-with-Optimization-Models | IEEE-2021 |
1267 | Joint-Computation-Offloading-and-Bandwidth-Assignment-in-Cloud-Assisted-Edge-Computing | IEEE-2022 |
1266 | An-Integrative-and-Privacy-Preserving-Based-Medical-Cloud-Platform | IEEE-2021 |
1265 | The-Realization-of-Key-Algorithm-of-Mobile-Internet-Traffic-Information-Mining-Based-on-Cloud-Computing | IEEE-2021 |
1264 | Design-and-Implementation-of-E-commerce-Recommendation-System-Model-Based-on-Cloud-Computing | IEEE-2021 |
1263 | Towards-Solving-a-Mixture-of-Issues-Using-Artificial-Intelligence-and-Cloud-Computing | IEEE-2021 |
1262 | Providing-Resilience-on-Cloud-Computing | IEEE-2021 |
1261 | National-Defense-Cloud-Strategy | IEEE-2021 |
1260 | A-Cost-Efficient-Auto-Scaling-Algorithm-for-Large-Scale-Graph-Processing-in-Cloud-Environments-with-Heterogeneous-Resources | IEEE-2021 |
1259 | A-Cloud-Guided-Feature-Extraction-Approach-for-Image-Retrieval-in-Mobile-Edge-Computing | IEEE-2021 |
1258 | Thermal-Prediction-for-Efficient-Energy-Management-of-Clouds-Using-Machine-Learning | IEEE-2021 |
1257 | AI-oriented-Workload-Allocation-for-Cloud-Edge-Computing | IEEE-2021 |
1256 | Protecting-Medical-Images-by-Using-Fused-Cryptographic-Technique-with-Fog-Computing | IEEE-2021 |
1255 | A-smartcard-based-key-agreement-framework-for-cloud-computing-using-ECC | IEEE-2021 |
1254 | An-Analytical-Survey-for-Improving-Authentication-levels-in-Cloud-Computing | IEEE-2021 |
1253 | Enhancing-the-Reliability-of-Cloud-Data-by-Implementing-AES-Algorithm | IEEE-2021 |
1252 | The-Key-of-Application-Software-Service-in-Science-Cloud-Computing | IEEE-2021 |
1251 | Hedonic-Pricing-of-Cloud-Computing-Services | IEEE-2021 |
1157 | Predicting-Workflow-Task-Execution-Time-in-the-Cloud-using-A-Two-Stage-Machine-Learning-Approach | NON IEEE -2020 |
1153 | Comments-on-“Secure-Data-Sharing-in-Cloud-Computing-Using-Revocable-Storage-Identity-Based-Encryption†| NON IEEE -2020 |
1152 | An-Application-of-IoT-for-Conduct-of-Laboratory-Experiment-from-Home | NON IEEE -2020 |
1043 | Implementation-Of-An-Enhanced-Ciphertext-Policy-Attribute-Based-Encryption-With-User-Repudiation-Method | NON IEEE -2021 |
1042 | Energy-Efficient-And-Cost-Optimized-Resource-Provisioning-In-Cloud-Computing | NON IEEE -2021 |
1041 | Cloud-Based-Secure-File-Storage-Using-Hybrid-Cryptography-Algorithm | NON IEEE -2021 |
1040 | Characteristics-Based-Information-Out-Resource-With-Relating-Verify-In-Clouds | NON IEEE -2021 |
1039 | An-Investigation-Of-An-Efficient-Attribute-Based-Encryption-Scheme-In-Cloud-Computing | NON IEEE -2021 |
1038 | Adopted-And-Verify-Contact-Manage-With-Several-File-Right-For-Cloud-Storage | NON IEEE -2021 |
1037 | Administration-Of-Data-In-Cloud-Computing | NON IEEE -2021 |
1036 | A-Review-On-Cloud-Computing-Adoption-In-Banks | NON IEEE -2021 |
1004 | Cloud-based-Protection-and-Performance-Improvement-in-the-E-Health-Management-Framework | 2020 |
1003 | Modeling-Smart-Cloud-Computing-Resource-Allocation-in-E-Learning | 2020 |
1002 | Speed-Limit-Camera-MonitoringTracking-System-Using-SaaS-Cloud-Computing-Module-and-GPS | 2020 |
1001 | Towards-Cloud-Computing-and-Blockchain-Integrated-Applications | 2020 |
1000 | Cloud-Computing-Data-Center-Structure-Based-on-Internet-of-Things-and-Its-Scheduling-Mechanism | 2020 |
999 | Fine-Grained-Access-Control-in-the-Era-of-Cloud-Computing-An-Analytical-Review | 2020 |
998 | An-Improvement-of-Task-Scheduling-Algorithms-for-Green-Cloud-Computing | 2020 |
997 | A-computational-and-analytical-approach-for-cloud-computing-security-with-user-data-management | 2020 |
996 | The-Design-of-a-Novel-Smart-Home-Control-System-using-Smart-Grid-Based-on-Edge-and-Cloud-Computing | 2020 |
995 | Green-computing-for-Internet-of-Things | 2020 |
994 | Transformation-of-Governance-through-Information-Technology-by-Cloud-Computing | 2020 |
993 | CLAWER-Context-aware-Cloud-Fog-based-Workflow-Management-Framework-for-Health-Emergency-Services | 2020 |
992 | Research-on-online-cloud-storage-technology | 2020 |
991 | Abnormal-Traffic-Monitoring-Methods-Based-on-a-Cloud-Computing-Platform | 2020 |
990 | Research-and-Application-of-Data-Privacy-Protection-Technology-in-Cloud-Computing-Environment-Based-on-Attribute-Encryption | 2020 |
989 | Heterogeneous-Task-Co-location-in-Containerized-Cloud-Computing-Environments | 2020 |
988 | MISSION-SWACHHTA | 2020 |
987 | Computation-Offloading-Strategy-Based-on-Deep-Reinforcement-Learning-in-CloudAssisted-Mobile-Edge-Computing | 2020 |
986 | Intrusion-Detection-and-Prevention-using-Honeypot-Network-for-Cloud-Security | 2020 |
322 | Development-of-Agricultural-Internet-of-Things-Monitoring-System-Combining-Cloud-Computing-and-WeChat-Technology | 2019 |
321 | A-New-Proposed-Sensor-Cloud-Architecture-Based-on-Fog-Computing-for-Internet-of-Things | 2019 |
320 | Efficient-load-Balancing-algorithm-analysis-in-Cloud-Computing | 2020 |
319 | Application-of-Steganography-Technique-in-Cloud-Computing | 2019 |
318 | Network-Traffic-based-Virtual-Machine-Migration-in-Cloud-Computing-Environment | 2019 |
317 | Cloud-Computing-Task-Scheduling-Algorithm-Based-On-Improved-Genetic-Algorithm | 2019 |
316 | Fine-Grained-Access-Control-in-the-Era-of-Cloud-Computing:-An-Analytical-Review | 2020 |
315 | Multi-level-Trust-Agreement-in-Cloud-Environment | 2019 |
314 | Comparison-of-Privacy-Preserving-Models-Based-on-a-Third-Party-Auditor-in-Cloud-Computing | 2020 |
313 | Research-of-Fine-Grit-Access-Control-Based-on-Time-in-Cloud-Computing | 2019 |
312 | Constructing-of-vulnerability-prevention-secure-model-for-the-cloud-computing | 2020 |
311 | An-IOT-Approach-to-Vehicle-Accident-Detection-using-Cloud-Computing | 2019 |
310 | Data-Protection-as-a-Service-in-the-Multi-Cloud-Environment | 2019 |
309 | Determination-of-Trustworthiness-of-Cloud-Service-Provider-and-Cloud-Customer | 2019 |
308 | Block-Chain-Based-Cloud-Computing-Model-on-EVM-Transactions-for-Secure-Voting | 2019 |
307 | Delivering-Data-Mining-Services-in-Cloud-Computing | 2019 |
306 | iPrivacy:-LWE-Enhanced-image-protection-over-cloud-storage | 2020 |
305 | Powering-Hands-on-Cybersecurity-Practices-with-Cloud-Computing | 2019 |
304 | Virtual-Machine-based-Hybrid-Auto-Scaling-for-Large-Scale-Scientific-Workflows-in-Cloud-Computing | 2020 |
303 | Comparison-of-RBAC-and-ABAC-Security-Models-for-Private-Cloud | 2019 |
302 | Multi-Objective-Resource-Mapping-and-Allocation-for-Volunteer-Cloud-Computing | 2019 |
301 | A-Simple-and-Secured-Cryptography-System-of-Cloud-Computing | 2019 |
300 | Towards-Ingestion-Processes-of-Kompsat-Data-in-Open-Data-Cube-on-Open-Source-Cloud-Computing-Environment | 2019 |
299 | A-Novel-Predictive-Resource-Allocation-Framework-for-Cloud-Computing | 2019 |
298 | DLECP:-A-Dynamic-Learning-based-Edge-Cloud-Placement-Framework-for-Mobile-Cloud-Computing | 2019 |
297 | Comparison-of-Various-Fault-Tolerance-Techniques-for-Scientific-Workflows-in-Cloud-Computing | 2019 |
296 | A-new-Security-Mechanism-for-Vehicular-Cloud-Computing-Using-Fog-Computing-System | 2019 |
295 | Online-Virtual-Machine-Assignment-Using-Multi-Armed-Bandit-in-Cloud-Computing | 2019 |
294 | Towards-a-Parallel-Constraint-Solver-for-Cloud-Computing-Environments | 2019 |
293 | Privacy-Preserving-Association-Rule-Mining-Algorithm-for-Encrypted-Data-in-Cloud-Computing | 2019 |
292 | Scalable-Pathogen-Pipeline-Platform-(SP^3):-Enabling-Unified-Genomic-Data-Analysis-with-Elastic-Cloud-Computing | 2019 |
291 | Analysis-and-Detection-of-DDoS-Attacks-on-Cloud-Computing-Environment-using-Machine-Learning-Techniques | 2019 |
290 | A-Deep-Learning-Based-Distributed-Smart-Surveillance-Architecture-using-Edge-and-Cloud-Computing | 2019 |
289 | Study-of-Cloud-Security-in-Hyper-scalers | 2020 |
288 | Cloud-of-Things-(CoT)-based-Smart-Cities | 2020 |
287 | IoT-and-Cloud-Computing-based-Smart-Water-Metering-System | 2019 |
286 | Fog-Computing-as-a-Complementary-Approach-to-Cloud-Computing | 2019 |
285 | Performance-Evaluation-of-Machine-Learning-Algorithms-for-Credit-Card-Fraud-Detection | 2019 |
284 | Movie-Recommender-System-Using-K-Means-Clustering-AND-K-Nearest-Neighbor | 2019 |
283 | Analysis-of-Educational-Data-Mining-using-Classification | 2019 |
282 | Collaborative-Validation-of-Public-Key-Certificates-for-IoT-by-Distributed-Caching | 2019 |
281 | A-Security-Model-for-the-Enhancement-of-Data-Privacy-in-Cloud-Computing | 2019 |
280 | Why-Does-Your-Data-Leak?-Uncovering-the-Data-Leakage-in-Cloud-from-Mobile-Apps | 2019 |
279 | Study-on-Deep-Unsupervised-Learning-Optimization-Algorithm-Based-on-Cloud-Computing | 2019 |
278 | Blockchain-based-Proxy-Re-Encryption-Scheme-for-Secure-IoT-Data-Sharing | 2019 |
277 | Developing-Realistic-Distributed-Denial-of-Service-(DDoS)-Attack-Dataset-and-Taxonomy | 2019 |
276 | Use-of-Machine-Learning-in-Detecting-Network-Security-of-Edge-Computing-System | 2019 |
275 | Docker-Swarm-and-Kubernetes-in-Cloud-Computing-Environment | 2019 |
274 | Game-Theoretical-Multi-user-Computation-Offloading-for-Mobile-Edge-Cloud-Computing | 2019 |
273 | Analysis-and-Evaluation-of-Kubernetes-Based-NFV-Management-and-Orchestration | 2019 |
272 | Study-on-Deep-Unsupervised-Learning-Optimization-Algorithm-Based-on-Cloud-Computing | 2019 |
271 | A-new-Security-Mechanism-for-Vehicular-Cloud-Computing-Using-Fog-Computing-System | 2019 |
270 | Automated-Cloud-Infrastructure-Continuous-Integration-and-Continuous-Delivery-using-Docker-with-Robust-Container-Security | 2019 |
269 | Real-time-Credit-Card-Fraud-Detection-Using-Machine-Learning | 2019 |