Articles
- Vol.23, No.1, 2025
- Vol.22, No.6, 2024
- Vol.22, No.5, 2024
- Vol.22, No.4, 2024
- Vol.22, No.3, 2024
- Vol.22, No.2, 2024
- Vol.22, No.1, 2024
- Vol.21, No.6, 2023
- Vol.21, No.5, 2023
- Vol.21, No.4, 2023
- Vol.21, No.3, 2023
- Vol.21, No.2, 2023
- Vol.21, No.1, 2023
- Vol.20, No.6, 2022
- Vol.20, No.5, 2022
- Vol.20, No.4, 2022
- Vol.20, No.3, 2022
- Vol.20, No.2, 2022
- Vol.20, No.1, 2022
- Vol.19, No.6, 2021
- Vol.19, No.5, 2021
- Vol.19, No.4, 2021
- Vol.19, No.3, 2021
- Vol.19, No.2, 2021
- Vol.19, No.1, 2021
This paper introduces a secure federated learning model for protecting patient data across cloud-integrated healthcare devices. The system ensures real-time anomaly detection and decentralized data privacy, strengthening resilience against breaches while promoting secure machine learning collaboration across institutions.
Tristan Howard Ellington, Olivia Charlotte Gresham, Nathaniel Rhys Middleton, Amelia Rose Hadley, Felix Jonathan Hartwell
Paper ID: 72321501 | ✅ Access Request |
The research designs a zero trust architecture tailored for multi-tenant clouds using software-defined perimeter (SDP) protocols. It validates enhanced control over network access, segmented workloads, and minimized lateral threats in dynamic cloud deployments.
Maxwell Julian Rivers, Charlotte Elise Pennington, Rupert Miles Hargrove, Lydia Beatrice Langley, Sebastian Hugh Ashcroft
Paper ID: 72321502 | ✅ Access Request |
This paper studies adversarial AI attacks against cloud-driven vision systems in autonomous transport. It proposes a hybrid anomaly-detection strategy combining entropy monitoring and gradient analysis to defend real-time object detection models deployed across interconnected smart traffic infrastructures.
Theodore James Bramley, Annabelle Grace Whitmore, Hugo Elias Carrington, Phoebe Elizabeth Temple, Dominic Arthur Tennyson
Paper ID: 72321503 | ✅ Access Request |
The study proposes a quantum key distribution (QKD) framework to safeguard file transfers in multi-cloud environments. Leveraging entangled photon pairs, the method ensures unbreakable encryption and intrusion detection, achieving high-speed secure exchange without key replication vulnerabilities.
Benedict Louis Redgrave, Georgina Alice Winthrop, Lucas Graham Rutledge, Helena May Davenport, Henry Isaac Belvedere
Paper ID: 72321504 | ✅ Access Request |
This research presents a secure API gateway orchestration model to manage data exchange among cloud-hosted SaaS ecosystems. It uses layered authentication and AI-based anomaly detection to mitigate unauthorized access, maintaining seamless operations between different enterprise service platforms.
Julian Patrick Kingsley, Florence Miranda Wilton, Edward Nathaniel Blaine, Sophie Catherine Rosenthal, Tobias Vincent Chatham
Paper ID: 72321505 | ✅ Access Request |
This paper presents an AI-based framework for preventing DDoS attacks within multi-tenant cloud infrastructure. Using machine learning, the system identifies abnormal traffic patterns and enhances real-time attack mitigation, ensuring the continuity and security of cloud-based services.
Oliver Theodore Baxter, Amelia Jean Hamilton, Natalie Margaret Royce, Lucas James Wetherby, Peter Daniel Southgate
Paper ID: 72321506 | ✅ Access Request |
The research explores blockchain technology to enable decentralized authentication in cloud storage for healthcare data. It ensures access control, enhances data integrity, and minimizes security breaches by leveraging smart contracts and distributed ledger technology.
Eliza Caroline Montgomery, Samuel Peter MacDonald, Sophia Isobel Langton, Matthew Thomas Kirk, Olivia Jane Preston
Paper ID: 72321507 | ✅ Access Request |
Back