References
- Bello, Sururah A., et al. “Cloud computing in construction industry: Use cases, benefits and challenges.” Automation in Construction 122 (2021): 103441. doi: 10.1016/j.autcon.2020.103441
- Sunyaev, Ali. “Cloud computing.” Internet computing. Springer, Cham, 2020. 195-236.
- Basu, Srijita, et al. “Cloud computing security challenges & solutions-A survey.” 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2018.
- Alouffi, Bader, et al. “A systematic literature review on cloud computing security: Threats and mitigation strategies.” IEEE Access 9 (2021): 57792-57807. doi: 10.1109/ACCESS.2021.3073203
- Montasari, Reza, et al. “Cloud computing security: Hardware-based attacks and countermeasures.” Digital Forensic Investigation of Internet of Things (IoT) Devices. Springer, Cham, 2021. 155-167.
- Vinoth, S., et al. “Application of cloud computing in banking and e-commerce and related security threats.” Materials Today: Proceedings 51 (2022): 2172-2175.
- Atieh, Ali T. “Assuring the Optimum Security Level for Network, Physical and Cloud Infrastructure.” ScienceOpen Preprints (2021).
- Bharadwaj, Deepak R., Anamika Bhattacharya, and Manivannan Chakkaravarthy. “Cloud threat defense–A threat protection and security compliance solution.” 2018 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM). IEEE, 2018.
- Thabit, Fursan, Sharaf Alhomdy, and Sudhir Jagtap. “A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions.” International Journal of Intelligent Networks 2 (2021): 18-33. doi: 10.1016/j.ijin.2021.03.001
- Timoshenko, Denis, et al. “Large Crowdcollected Facial Anti-Spoofing Dataset.” 2019 Computer Science and Information Technologies (CSIT) (2019): 123-126.
- Sharma, Shilpa, et al. “Hybrid HOG-SVM encrypted face detection and recognition model.” Journal of Discrete Mathematical Sciences and Cryptography 25.1 (2022): 205-218. doi: 10.1080/09720529.2021.2014141
- dataset, link: https://www.kaggle.com/code/faber24/face-anti-spoofing-detection-using-mobilenetv2/data, last accessed on June 2022.
- Demšar, Janez, et al. “Orange: data mining toolbox in Python.” The Journal of Machine Learning Research 14.1 (2013): 2349-2353.
- Gupta, Awaneesh, et al. “Role of cloud computing in management and education.” Materials Today: Proceedings (2021).
- Chyad, Haitham Salman, Raniah Ali Mustafa, and Dena Nadir George. “Cloud resources modelling using smart cloud management.” Bulletin of Electrical Engineering and Informatics 11.2 (2022): 1134-1142. doi: 10.11591/eei.v11i2.3286
- Snehi, Manish, and Abhinav Bhandari. “Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks.” Computer Science Review 40 (2021): 100371. doi: 10.1016/j.cosrev.2021.100371