期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Security Implications of Edge Computing in Cloud Networks 被引量:1
1
作者 sina ahmadi 《Journal of Computer and Communications》 2024年第2期26-46,共21页
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r... Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques. 展开更多
关键词 Edge Computing Cloud Networks Artificial Intelligence Machine Learning Cloud Security
下载PDF
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
2
作者 sina ahmadi 《Journal of Information Security》 2024年第2期148-167,共20页
Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for ... Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for organizations to ensure the security of their applications, data, and cloud-based networks to use cloud services effectively. This systematic literature review aims to determine the latest information regarding cloud computing security, with a specific emphasis on threats and mitigation strategies. Additionally, it highlights some common threats related to cloud computing security, such as distributed denial-of-service (DDoS) attacks, account hijacking, malware attacks, and data breaches. This research also explores some mitigation strategies, including security awareness training, vulnerability management, security information and event management (SIEM), identity and access management (IAM), and encryption techniques. It discusses emerging trends in cloud security, such as integrating artificial intelligence (AI) and machine learning (ML), serverless computing, and containerization, as well as the effectiveness of the shared responsibility model and its related challenges. The importance of user awareness and the impact of emerging technologies on cloud security have also been discussed in detail to mitigate security risks. A literature review of previous research and scholarly articles has also been conducted to provide insights regarding cloud computing security. It shows the need for continuous research and innovation to address emerging threats and maintain a security-conscious culture in the company. 展开更多
关键词 Cloud Security Threat Analysis Mitigation Strategies Emerging Trends Ethi-cal Considerations Data Analysis
下载PDF
Assessment of the anterior chamber parameters after laser iridotomy in primary angle close suspect using Pentacam and gonioscopy 被引量:8
3
作者 Alireza Esmaeili Behzad Barazandeh +3 位作者 sina ahmadi Alireza Haghi Seyed Mahdi ahmadi Hosseini Fereshteh Abolbashari 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2013年第5期680-684,共5页
AIM:To evaluate the changes in the anterior segment parameters of the subjects with primary angle closure suspect(PACS) before and after laser iridotomy(LI) using the Pentacam and gonioscopy. METHODS:Forty-eight eyes ... AIM:To evaluate the changes in the anterior segment parameters of the subjects with primary angle closure suspect(PACS) before and after laser iridotomy(LI) using the Pentacam and gonioscopy. METHODS:Forty-eight eyes of 48 PACS were included.Anterior chamber angle(ACA),central anterior chamber depth(ACD),anterior chamber volume(ACV) and central corneal thickness(CCT) were recorded from the Pentacam before and one month after LI.ACA was graded according to Shaffer classification using Goldmann gonioscopy.RESULTS:ACA increased significantly from 25.59±4.41 to 26.46±4.33 degrees(P=0.009) and ACV changed from 85.97±16.07mm3to 99.25±15.83mm3(P=0.000).The changes in ACD,CCT and intraocular pressure were non-significant(P】0.05).Gonioscopy showed significant widening of the Shaffer angle in 4 quadrants(P【0.001).CONCLUSION:Pentacam can serve as the objective instrument in assessing the efficacy of LI. 展开更多
关键词 GLAUCOMA laser iridotomy PENTACAM angle closure GONIOSCOPY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部