Cloud Computing Security for Algorithms
dc.contributor.author | Abdulateef, A.A. | |
dc.contributor.author | Mohammed, A.H. | |
dc.contributor.author | Abdulateef, I.A. | |
dc.date.accessioned | 2024-09-29T16:20:49Z | |
dc.date.available | 2024-09-29T16:20:49Z | |
dc.date.issued | 2020 | |
dc.department | Karabük Üniversitesi | en_US |
dc.description | 4th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2020 -- 22 October 2020 through 24 October 2020 -- Istanbul -- 165025 | en_US |
dc.description.abstract | Distributed computing (CC), without unequivocal and direct use oversight, gives the chance of on request admittance to arrange framework, specifically to information handling and capacity limits. As of late, CC has emerged as a network of public and private server farms giving a typical online interface to customers. Edge registering is a developing model of figuring that takes handling and capacity closer to end-clients to build reaction times and capacity for reinforcement move. Versatile CC (MCC) pushes programming to cell phones by utilizing disseminated figuring. Registering and edge processing, in any case, are confronting security issues, including framework weaknesses and association identification, that quickly postpones figuring models' acknowledgment. The investigation of PC algo-lithms, which definitely create through training, is AI (ML). We assess security dangers, difficulties and arrangements that utilization at least one ML calculations in this examination report. In this report we have We study various AI calculations, including regulated, unattended, semi-administered, and improved learning, used to tackle cloud security issues. At that point we look at every innovation 's proficiency dependent on its properties, advantages and burdens. Besides, we have potential testing suggestions to stable CC models. © 2020 IEEE. | en_US |
dc.identifier.doi | 10.1109/ISMSIT50672.2020.9254372 | |
dc.identifier.isbn | 978-172819090-7 | |
dc.identifier.scopus | 2-s2.0-85097678156 | en_US |
dc.identifier.scopusquality | N/A | en_US |
dc.identifier.uri | https://doi.org/10.1109/ISMSIT50672.2020.9254372 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14619/9355 | |
dc.indekslendigikaynak | Scopus | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartof | 4th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2020 - Proceedings | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | CLOUD COMPUTING | en_US |
dc.subject | Distributed computing | en_US |
dc.subject | ML | en_US |
dc.subject | Platform-as-a-Service | en_US |
dc.title | Cloud Computing Security for Algorithms | en_US |
dc.type | Conference Object | en_US |