Articles
- Vol.23, No.1, 2025
- Vol.22, No.6, 2024
- Vol.22, No.5, 2024
- Vol.22, No.4, 2024
- Vol.22, No.3, 2024
- Vol.22, No.2, 2024
- Vol.22, No.1, 2024
- Vol.21, No.6, 2023
- Vol.21, No.5, 2023
- Vol.21, No.4, 2023
- Vol.21, No.3, 2023
- Vol.21, No.2, 2023
- Vol.21, No.1, 2023
- Vol.20, No.6, 2022
- Vol.20, No.5, 2022
- Vol.20, No.4, 2022
- Vol.20, No.3, 2022
- Vol.20, No.2, 2022
- Vol.20, No.1, 2022
- Vol.19, No.6, 2021
- Vol.19, No.5, 2021
- Vol.19, No.4, 2021
- Vol.19, No.3, 2021
- Vol.19, No.2, 2021
- Vol.19, No.1, 2021
This study proposes a cloud-enabled biometric authentication protocol designed for resource-constrained IoT devices. The system ensures strong identity validation using encrypted biometric traits while preserving speed and minimizing processing demands on embedded sensors and platforms.
Isabelle Fiona Hargreaves, Thomas Wesley Carrington, Henry Mitchell Osborne, Olivia Charlotte Fielding, Dominic Lucas Prescott
Paper ID: 72422301 | ✅ Access Request |
This paper introduces a scalable malware detection model using deep learning classifiers optimized for hybrid cloud setups. The model provides high detection accuracy, low false positive rates, and real-time response to rapidly evolving cyber threats in distributed cloud infrastructures.
Lucas Andrew Fenwick, Madeleine Sophie Redman, Zachary Edward Monroe, Francesca Louise Browning, Ethan Samuel Holcombe
Paper ID: 72422302 | ✅ Access Request |
This paper presents a federated learning-based model to support confidential cybersecurity data sharing across cloud vendors. It enables collaborative threat detection while retaining data sovereignty and user privacy through encrypted aggregation and secure multiparty computation frameworks.
Charlotte Hazel Ellington, Matthew Julian Caldwell, Eliza Grace Pennington, Jonathan Miles Rowley, Abigail Frances Marsh
Paper ID: 72422303 | ✅ Access Request |
This research proposes a cloud-native anomaly detection framework utilizing streaming log analytics. The system continuously monitors operational logs across distributed instances, identifying threats and failures using ensemble learning techniques with real-time visualization dashboards.
Oscar William Delaney, Harriet Amelia Griffiths, Joshua Peter Whitman, Sophie Rebecca Langley, Daniel Edward Rainsford
Paper ID: 72422304 | ✅ Access Request |
This paper introduces a novel multi-factor authentication protocol combining behavioral biometrics and token-based access control for secure cloud-based financial services. The model resists spoofing attacks, enhances fraud detection, and maintains user experience through passive continuous identity verification.
Emily Katherine Brewster, Harrison Joseph Stokes, Isabella Faith Harcourt, William Stanley Arkwright, Chloe Isabelle Waddington
Paper ID: 72422305 | ✅ Access Request |
This research introduces a blockchain-enhanced access control model that dynamically manages user privileges across distributed cloud systems. Role-aware policy enforcement ensures accountability, data integrity, and verifiable logs while preventing unauthorized escalation of credentials within decentralized application environments.
Leo Frederick Hammond, Natalie Paige Cuthbert, Benjamin Thomas Ormsby, Amelia Joy Kingswell, George Leonard Milburn
Paper ID: 72422306 | ✅ Access Request |
This study proposes a cloud-wide encryption framework that rotates cryptographic keys based on predicted access latency and system load. The model improves data confidentiality while minimizing service delays, suitable for large-scale storage solutions with diverse access patterns.
Grace Eleanor Farnsworth, Hugo Oliver Thornton, Daisy Annabel Vickers, Isaac Samuel Donnelly, Matilda Florence Wrenford
Paper ID: 72422307 | ✅ Access Request |
Back