Tag Archives:security

A systematic mapping study of design and deployment models in cloud computing

AoS. A systematic mapping study of design and deployment models in cloud computing.

In the traditional system of computing, all that is required in terms of applications, runtime, operating system and networking are provided by the organization. In cloud computing, various levels of resources are available at a cloud service

Wireless patient monitoring systems: Can Black hole and Selective forwarding attacks be stopped?

In the past decades there have been advancements in technology and medical science. The two field are going hand-in-hand for providing better care to the people. For example, an automated patient monitoring system allows the vitals of