Articles
- Vol.23, No.1, 2025
- Vol.22, No.6, 2024
- Vol.22, No.5, 2024
- Vol.22, No.4, 2024
- Vol.22, No.3, 2024
- Vol.22, No.2, 2024
- Vol.22, No.1, 2024
- Vol.21, No.6, 2023
- Vol.21, No.5, 2023
- Vol.21, No.4, 2023
- Vol.21, No.3, 2023
- Vol.21, No.2, 2023
- Vol.21, No.1, 2023
- Vol.20, No.6, 2022
- Vol.20, No.5, 2022
- Vol.20, No.4, 2022
- Vol.20, No.3, 2022
- Vol.20, No.2, 2022
- Vol.20, No.1, 2022
- Vol.19, No.6, 2021
- Vol.19, No.5, 2021
- Vol.19, No.4, 2021
- Vol.19, No.3, 2021
- Vol.19, No.2, 2021
- Vol.19, No.1, 2021
This paper presents a federated learning-based intrusion detection system designed for multi-tier cloud environments. It preserves data privacy while enabling real-time anomaly detection, improving threat mitigation and enhancing cloud security posture without centralized data aggregation.
Vincent Hugo Ashford, Zoe Madeline Prescott, Gabriel Charles Dalton, Isabel Fiona Langston, Noah Patrick Whitmore
Paper ID: 72422401 | ✅ Access Request |
We propose a data synchronization mechanism that protects cloud-edge systems against ransomware threats. The approach ensures continuous replication and secure rollback mechanisms, enabling fast recovery and safeguarding enterprise continuity in the event of malicious encryption attempts.
Henry Tobias Wynn, Olivia Harriet Garrison, Jack Nathaniel Clements, Eliza Margot Bainbridge, Frederick Colin Yates
Paper ID: 72422402 | ✅ Access Request |
This study presents a decentralized identity verification architecture using blockchain for enhancing trust and security in cloud ecosystems. It ensures verifiable credentials, access transparency, and revocation control without relying on centralized authorities or third-party providers.
Julian Edward Lockhart, Clara Elise Timmons, Owen Gregory Benson, Natalie Ruth Sanderson, Felix Jordan Caldwell
Paper ID: 72422403 | ✅ Access Request |
This paper introduces dynamic load balancing strategies aimed at reducing latency in smart grid communications deployed via cloud infrastructure. The model enhances network performance and data security, ensuring real-time responsiveness in critical grid control systems.
Benjamin Isaac Harrow, Amelia Sophie Thorne, Julian Marcus Renner, Lillian Ava Crowley, George Lucas Armstrong
Paper ID: 72422404 | ✅ Access Request |
This study evaluates integrating Zero Trust principles with Secure Access Service Edge (SASE) models for enhancing cloud workload security. The proposed framework minimizes attack surfaces, enforces least privilege access, and dynamically adapts to evolving enterprise threats.
Charlotte Grace Redford, Samuel Louis Durant, Elliot Jacob Hargrove, Victoria Elise Summers, Noah Franklin Pritchard
Paper ID: 72422405 | ✅ Access Request |
The paper presents a scalable homomorphic encryption framework that enables privacy-preserving computations in multi-cloud setups. It reduces computational overhead while supporting collaborative analytics on encrypted datasets without compromising data confidentiality or service performance.
Edward Lionel Carrington, Hannah June Westbrook, Sebastian Oliver Quinn, Rebecca Anne Stratton, Leo Mitchell Bowden
Paper ID: 72422406 | ✅ Access Request |
Back