246 related articles for article (PubMed ID: 34435101)
1. Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis.
Edu AS; Agoyi M; Agozie D
PeerJ Comput Sci; 2021; 7():e658. PubMed ID: 34435101
[TBL] [Abstract][Full Text] [Related]
2. The Current Status and Promotional Strategies for Cloud Migration of Hospital Information Systems in China: Strengths, Weaknesses, Opportunities, and Threats Analysis.
Xu J
JMIR Med Inform; 2024 Feb; 12():e52080. PubMed ID: 38315519
[TBL] [Abstract][Full Text] [Related]
3. Security issues and challenges in cloud of things-based applications for industrial automation.
Pandey NK; Kumar K; Saini G; Mishra AK
Ann Oper Res; 2023 Mar; ():1-20. PubMed ID: 37361100
[TBL] [Abstract][Full Text] [Related]
4. Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations.
Saeed S; Altamimi SA; Alkayyal NA; Alshehri E; Alabbad DA
Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571451
[TBL] [Abstract][Full Text] [Related]
5. Challenges of the digital age for privacy and personal data protection.
Romansky RP; Noninska IS
Math Biosci Eng; 2020 Aug; 17(5):5288-5303. PubMed ID: 33120553
[TBL] [Abstract][Full Text] [Related]
6. Methodology for Digital Transformation with Internet of Things and Cloud Computing: A Practical Guideline for Innovation in Small- and Medium-Sized Enterprises.
Liu Y; Ni Z; Karlsson M; Gong S
Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450797
[TBL] [Abstract][Full Text] [Related]
7. Cloud computing applications for biomedical science: A perspective.
Navale V; Bourne PE
PLoS Comput Biol; 2018 Jun; 14(6):e1006144. PubMed ID: 29902176
[TBL] [Abstract][Full Text] [Related]
8. Cloud Computing Enabled Big Multi-Omics Data Analytics.
Koppad S; B A; Gkoutos GV; Acharjee A
Bioinform Biol Insights; 2021; 15():11779322211035921. PubMed ID: 34376975
[TBL] [Abstract][Full Text] [Related]
9. Big Data Precision Marketing Approach under IoT Cloud Platform Information Mining.
Li W
Comput Intell Neurosci; 2022; 2022():4828108. PubMed ID: 35069719
[TBL] [Abstract][Full Text] [Related]
10. Data-Driven Threat Analysis for Ensuring Security in Cloud Enabled Systems.
Alwaheidi MKS; Islam S
Sensors (Basel); 2022 Jul; 22(15):. PubMed ID: 35957281
[TBL] [Abstract][Full Text] [Related]
11. The Construction of Big Data Computational Intelligence System for E-Government in Cloud Computing Environment and Its Development Impact.
Ma S; Hao F; Lin Y; Liang Y
Comput Intell Neurosci; 2022; 2022():7295060. PubMed ID: 35371194
[TBL] [Abstract][Full Text] [Related]
12. Optimization Strategy of College Students' Education Management Based on Smart Cloud Platform Teaching.
Zhang M
Comput Intell Neurosci; 2023; 2023():5642142. PubMed ID: 37854642
[TBL] [Abstract][Full Text] [Related]
13. Big data analytics in medical engineering and healthcare: methods, advances and challenges.
Wang L; Alexander CA
J Med Eng Technol; 2020 Aug; 44(6):267-283. PubMed ID: 32498594
[TBL] [Abstract][Full Text] [Related]
14. An analytical model to minimize the latency in healthcare internet-of-things in fog computing environment.
Shukla S; Hassan MF; Khan MK; Jung LT; Awang A
PLoS One; 2019; 14(11):e0224934. PubMed ID: 31721807
[TBL] [Abstract][Full Text] [Related]
15. Big data analytics in Cloud computing: an overview.
Berisha B; Mëziu E; Shabani I
J Cloud Comput (Heidelb); 2022; 11(1):24. PubMed ID: 35966392
[TBL] [Abstract][Full Text] [Related]
16. Can cloud computing benefit health services? - a SWOT analysis.
Kuo MH; Kushniruk A; Borycki E
Stud Health Technol Inform; 2011; 169():379-83. PubMed ID: 21893777
[TBL] [Abstract][Full Text] [Related]
17. Big Data Analytics Using Cloud Computing Based Frameworks for Power Management Systems: Status, Constraints, and Future Recommendations.
Al-Jumaili AHA; Muniyandi RC; Hasan MK; Paw JKS; Singh MJ
Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991663
[TBL] [Abstract][Full Text] [Related]
18. Z-number based fuzzy MCDM models for analyzing non-traditional security threats to finance supply chains: A case study from Vietnam.
Nguyen PH; Nguyen LT; Pham TV; Nguyen KA; Nguyen MN; Nguyen LT; Nguyen LT
Heliyon; 2024 Jun; 10(11):e31615. PubMed ID: 38841460
[TBL] [Abstract][Full Text] [Related]
19. Criminal law regulation of cyber fraud crimes-from the perspective of citizens' personal information protection in the era of edge computing.
Zhang Y; Dong H
J Cloud Comput (Heidelb); 2023; 12(1):64. PubMed ID: 37122827
[TBL] [Abstract][Full Text] [Related]
20. Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges.
Malik AW; Bhatti DS; Park TJ; Ishtiaq HU; Ryou JC; Kim KI
Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38257526
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]