Emerging technologies for securing the cloud and IoT:
"In an age defined by the transformative ascent of cloud computing and the Internet of Things (IoT), our technological landscape has undergone a revolutionary evolution, enhancing convenience and connectivity in unprecedented ways. This convergence, while redefining how we interact with data an...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
2024.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "In an age defined by the transformative ascent of cloud computing and the Internet of Things (IoT), our technological landscape has undergone a revolutionary evolution, enhancing convenience and connectivity in unprecedented ways. This convergence, while redefining how we interact with data and devices, has also brought to the forefront a pressing concern - the susceptibility of these systems to security breaches. As cloud services integrate further into our daily lives and the IoT saturates every aspect of our routines, the looming potential for cyberattacks and data breaches necessitates immediate and robust solutions to fortify the protection of sensitive information, ensuring the privacy and integrity of individuals, organizations, and critical infrastructure.Emerging Technologies for Securing the Cloud and IoT emerges as a comprehensive and timely solution to address the multifaceted security challenges posed by these groundbreaking technologies. Edited by Amina Ahmed Nacer from the University of Lorraine, France, and Mohammed Riyadh Abdmeziem from Ecole Nationale Supérieur d'Informatique, Algeria, this book serves as an invaluable guide for both academic scholars and industry experts. Its content delves deeply into the intricate web of security concerns, elucidating the potential ramifications of unaddressed vulnerabilities within cloud and IoT systems. With a pragmatic focus on real-world applications, the book beckons authors to explore themes like security frameworks, integration of AI and machine learning, data safeguarding, threat modeling, and more. Authored by esteemed researchers, practitioners, and luminaries, each chapter bridges the divide between theory and implementation, aiming to be an authoritative reference empowering readers to adeptly navigate the complexities of securing cloud-based IoT systems. A crucial resource for scholars, students, professionals, and policymakers striving to comprehend, confront, and surmount contemporary and future security challenges, this book stands as the quintessential guide for ushering in an era of secure technological advancement."-- |
Beschreibung: | 21 PDFs (361 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9798369307670 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00324605 | ||
003 | IGIG | ||
005 | 20240414190106.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 240410s2024 pau fob 001 0 eng d | ||
020 | |a 9798369307670 |q PDF | ||
020 | |z 9798369307663 |q print | ||
024 | 7 | |a 10.4018/979-8-3693-0766-3 |2 doi | |
035 | |a (CaBNVSL)slc00005746 | ||
035 | |a (OCoLC)1429862736 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.585 |b .E44 2024e | |
082 | 7 | |a 004.67/82 |2 23 | |
245 | 0 | 0 | |a Emerging technologies for securing the cloud and IoT |c Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, editors. |
246 | 3 | |a Emerging technologies for securing the cloud and internet of things | |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c 2024. | |
300 | |a 21 PDFs (361 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Smart applications based on IoT: challenges and emerging trends landscape -- Chapter 2. A review of artificial intelligence techniques for improved cloud and IoT security -- Chapter 3. Deep learning for IoT security: applications and challenges -- Chapter 4. Recent developments of semantic web: technologies and challenges -- Chapter 5. Development of artificial intelligence of things and cloud computing environments through semantic web control models -- Chapter 6. Privacy-preserving machine learning techniques for IoT data in cloud environments -- Chapter 7. Chatgpt and ensemble learning for mobile text misinformation identification -- Chapter 8. Analyzing the efficacy of machine learning algorithms on intrusion detection systems -- Chapter 9. Secure communication protocols for cloud and IoT: a comprehensive review -- Chapter 10. Landscape of serverless computing technology and IoT tools in the IT sectors -- Chapter 11. Enhancing cloud and IoT security: leveraging IoT technology for multi-factor user authentication -- Chapter 12. SISA en-decryption algorithm for multilingual data privacy and security in IoT. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "In an age defined by the transformative ascent of cloud computing and the Internet of Things (IoT), our technological landscape has undergone a revolutionary evolution, enhancing convenience and connectivity in unprecedented ways. This convergence, while redefining how we interact with data and devices, has also brought to the forefront a pressing concern - the susceptibility of these systems to security breaches. As cloud services integrate further into our daily lives and the IoT saturates every aspect of our routines, the looming potential for cyberattacks and data breaches necessitates immediate and robust solutions to fortify the protection of sensitive information, ensuring the privacy and integrity of individuals, organizations, and critical infrastructure.Emerging Technologies for Securing the Cloud and IoT emerges as a comprehensive and timely solution to address the multifaceted security challenges posed by these groundbreaking technologies. Edited by Amina Ahmed Nacer from the University of Lorraine, France, and Mohammed Riyadh Abdmeziem from Ecole Nationale Supérieur d'Informatique, Algeria, this book serves as an invaluable guide for both academic scholars and industry experts. Its content delves deeply into the intricate web of security concerns, elucidating the potential ramifications of unaddressed vulnerabilities within cloud and IoT systems. With a pragmatic focus on real-world applications, the book beckons authors to explore themes like security frameworks, integration of AI and machine learning, data safeguarding, threat modeling, and more. Authored by esteemed researchers, practitioners, and luminaries, each chapter bridges the divide between theory and implementation, aiming to be an authoritative reference empowering readers to adeptly navigate the complexities of securing cloud-based IoT systems. A crucial resource for scholars, students, professionals, and policymakers striving to comprehend, confront, and surmount contemporary and future security challenges, this book stands as the quintessential guide for ushering in an era of secure technological advancement."-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 04/10/2024). | ||
650 | 0 | |a Blockchains (Databases) | |
650 | 0 | |a Cloud computing. | |
650 | 0 | |a Internet of things. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Abdmeziem, Mohammed Riyadh, |e editor. | |
700 | 1 | |a Nacer, Amina Ahmed, |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 9798369307663 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0766-3 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00324605 |
---|---|
_version_ | 1816797087675711488 |
adam_text | |
any_adam_object | |
author2 | Abdmeziem, Mohammed Riyadh Nacer, Amina Ahmed |
author2_role | edt edt |
author2_variant | m r a mr mra a a n aa aan |
author_facet | Abdmeziem, Mohammed Riyadh Nacer, Amina Ahmed |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 .E44 2024e |
callnumber-search | QA76.585 .E44 2024e |
callnumber-sort | QA 276.585 E44 42024E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Smart applications based on IoT: challenges and emerging trends landscape -- Chapter 2. A review of artificial intelligence techniques for improved cloud and IoT security -- Chapter 3. Deep learning for IoT security: applications and challenges -- Chapter 4. Recent developments of semantic web: technologies and challenges -- Chapter 5. Development of artificial intelligence of things and cloud computing environments through semantic web control models -- Chapter 6. Privacy-preserving machine learning techniques for IoT data in cloud environments -- Chapter 7. Chatgpt and ensemble learning for mobile text misinformation identification -- Chapter 8. Analyzing the efficacy of machine learning algorithms on intrusion detection systems -- Chapter 9. Secure communication protocols for cloud and IoT: a comprehensive review -- Chapter 10. Landscape of serverless computing technology and IoT tools in the IT sectors -- Chapter 11. Enhancing cloud and IoT security: leveraging IoT technology for multi-factor user authentication -- Chapter 12. SISA en-decryption algorithm for multilingual data privacy and security in IoT. |
ctrlnum | (CaBNVSL)slc00005746 (OCoLC)1429862736 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05068nam a2200469 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00324605</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20240414190106.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">240410s2024 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369307670</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9798369307663</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-0766-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00005746</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1429862736</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield><subfield code="b">.E44 2024e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Emerging technologies for securing the cloud and IoT </subfield><subfield code="c">Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, editors.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Emerging technologies for securing the cloud and internet of things </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">2024.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">21 PDFs (361 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Smart applications based on IoT: challenges and emerging trends landscape -- Chapter 2. A review of artificial intelligence techniques for improved cloud and IoT security -- Chapter 3. Deep learning for IoT security: applications and challenges -- Chapter 4. Recent developments of semantic web: technologies and challenges -- Chapter 5. Development of artificial intelligence of things and cloud computing environments through semantic web control models -- Chapter 6. Privacy-preserving machine learning techniques for IoT data in cloud environments -- Chapter 7. Chatgpt and ensemble learning for mobile text misinformation identification -- Chapter 8. Analyzing the efficacy of machine learning algorithms on intrusion detection systems -- Chapter 9. Secure communication protocols for cloud and IoT: a comprehensive review -- Chapter 10. Landscape of serverless computing technology and IoT tools in the IT sectors -- Chapter 11. Enhancing cloud and IoT security: leveraging IoT technology for multi-factor user authentication -- Chapter 12. SISA en-decryption algorithm for multilingual data privacy and security in IoT.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"In an age defined by the transformative ascent of cloud computing and the Internet of Things (IoT), our technological landscape has undergone a revolutionary evolution, enhancing convenience and connectivity in unprecedented ways. This convergence, while redefining how we interact with data and devices, has also brought to the forefront a pressing concern - the susceptibility of these systems to security breaches. As cloud services integrate further into our daily lives and the IoT saturates every aspect of our routines, the looming potential for cyberattacks and data breaches necessitates immediate and robust solutions to fortify the protection of sensitive information, ensuring the privacy and integrity of individuals, organizations, and critical infrastructure.Emerging Technologies for Securing the Cloud and IoT emerges as a comprehensive and timely solution to address the multifaceted security challenges posed by these groundbreaking technologies. Edited by Amina Ahmed Nacer from the University of Lorraine, France, and Mohammed Riyadh Abdmeziem from Ecole Nationale Supérieur d'Informatique, Algeria, this book serves as an invaluable guide for both academic scholars and industry experts. Its content delves deeply into the intricate web of security concerns, elucidating the potential ramifications of unaddressed vulnerabilities within cloud and IoT systems. With a pragmatic focus on real-world applications, the book beckons authors to explore themes like security frameworks, integration of AI and machine learning, data safeguarding, threat modeling, and more. Authored by esteemed researchers, practitioners, and luminaries, each chapter bridges the divide between theory and implementation, aiming to be an authoritative reference empowering readers to adeptly navigate the complexities of securing cloud-based IoT systems. A crucial resource for scholars, students, professionals, and policymakers striving to comprehend, confront, and surmount contemporary and future security challenges, this book stands as the quintessential guide for ushering in an era of secure technological advancement."--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 04/10/2024).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Blockchains (Databases)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abdmeziem, Mohammed Riyadh,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nacer, Amina Ahmed,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9798369307663</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0766-3</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00324605 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:52:00Z |
institution | BVB |
isbn | 9798369307670 |
language | English |
oclc_num | 1429862736 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 21 PDFs (361 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global, |
record_format | marc |
spelling | Emerging technologies for securing the cloud and IoT Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, editors. Emerging technologies for securing the cloud and internet of things Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, 2024. 21 PDFs (361 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Smart applications based on IoT: challenges and emerging trends landscape -- Chapter 2. A review of artificial intelligence techniques for improved cloud and IoT security -- Chapter 3. Deep learning for IoT security: applications and challenges -- Chapter 4. Recent developments of semantic web: technologies and challenges -- Chapter 5. Development of artificial intelligence of things and cloud computing environments through semantic web control models -- Chapter 6. Privacy-preserving machine learning techniques for IoT data in cloud environments -- Chapter 7. Chatgpt and ensemble learning for mobile text misinformation identification -- Chapter 8. Analyzing the efficacy of machine learning algorithms on intrusion detection systems -- Chapter 9. Secure communication protocols for cloud and IoT: a comprehensive review -- Chapter 10. Landscape of serverless computing technology and IoT tools in the IT sectors -- Chapter 11. Enhancing cloud and IoT security: leveraging IoT technology for multi-factor user authentication -- Chapter 12. SISA en-decryption algorithm for multilingual data privacy and security in IoT. Restricted to subscribers or individual electronic text purchasers. "In an age defined by the transformative ascent of cloud computing and the Internet of Things (IoT), our technological landscape has undergone a revolutionary evolution, enhancing convenience and connectivity in unprecedented ways. This convergence, while redefining how we interact with data and devices, has also brought to the forefront a pressing concern - the susceptibility of these systems to security breaches. As cloud services integrate further into our daily lives and the IoT saturates every aspect of our routines, the looming potential for cyberattacks and data breaches necessitates immediate and robust solutions to fortify the protection of sensitive information, ensuring the privacy and integrity of individuals, organizations, and critical infrastructure.Emerging Technologies for Securing the Cloud and IoT emerges as a comprehensive and timely solution to address the multifaceted security challenges posed by these groundbreaking technologies. Edited by Amina Ahmed Nacer from the University of Lorraine, France, and Mohammed Riyadh Abdmeziem from Ecole Nationale Supérieur d'Informatique, Algeria, this book serves as an invaluable guide for both academic scholars and industry experts. Its content delves deeply into the intricate web of security concerns, elucidating the potential ramifications of unaddressed vulnerabilities within cloud and IoT systems. With a pragmatic focus on real-world applications, the book beckons authors to explore themes like security frameworks, integration of AI and machine learning, data safeguarding, threat modeling, and more. Authored by esteemed researchers, practitioners, and luminaries, each chapter bridges the divide between theory and implementation, aiming to be an authoritative reference empowering readers to adeptly navigate the complexities of securing cloud-based IoT systems. A crucial resource for scholars, students, professionals, and policymakers striving to comprehend, confront, and surmount contemporary and future security challenges, this book stands as the quintessential guide for ushering in an era of secure technological advancement."-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 04/10/2024). Blockchains (Databases) Cloud computing. Internet of things. Electronic books. Abdmeziem, Mohammed Riyadh, editor. Nacer, Amina Ahmed, editor. IGI Global, publisher. Print version: 9798369307663 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0766-3 Volltext |
spellingShingle | Emerging technologies for securing the cloud and IoT Chapter 1. Smart applications based on IoT: challenges and emerging trends landscape -- Chapter 2. A review of artificial intelligence techniques for improved cloud and IoT security -- Chapter 3. Deep learning for IoT security: applications and challenges -- Chapter 4. Recent developments of semantic web: technologies and challenges -- Chapter 5. Development of artificial intelligence of things and cloud computing environments through semantic web control models -- Chapter 6. Privacy-preserving machine learning techniques for IoT data in cloud environments -- Chapter 7. Chatgpt and ensemble learning for mobile text misinformation identification -- Chapter 8. Analyzing the efficacy of machine learning algorithms on intrusion detection systems -- Chapter 9. Secure communication protocols for cloud and IoT: a comprehensive review -- Chapter 10. Landscape of serverless computing technology and IoT tools in the IT sectors -- Chapter 11. Enhancing cloud and IoT security: leveraging IoT technology for multi-factor user authentication -- Chapter 12. SISA en-decryption algorithm for multilingual data privacy and security in IoT. Blockchains (Databases) Cloud computing. Internet of things. |
title | Emerging technologies for securing the cloud and IoT |
title_alt | Emerging technologies for securing the cloud and internet of things |
title_auth | Emerging technologies for securing the cloud and IoT |
title_exact_search | Emerging technologies for securing the cloud and IoT |
title_full | Emerging technologies for securing the cloud and IoT Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, editors. |
title_fullStr | Emerging technologies for securing the cloud and IoT Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, editors. |
title_full_unstemmed | Emerging technologies for securing the cloud and IoT Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, editors. |
title_short | Emerging technologies for securing the cloud and IoT |
title_sort | emerging technologies for securing the cloud and iot |
topic | Blockchains (Databases) Cloud computing. Internet of things. |
topic_facet | Blockchains (Databases) Cloud computing. Internet of things. Electronic books. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0766-3 |
work_keys_str_mv | AT abdmeziemmohammedriyadh emergingtechnologiesforsecuringthecloudandiot AT naceraminaahmed emergingtechnologiesforsecuringthecloudandiot AT igiglobal emergingtechnologiesforsecuringthecloudandiot AT abdmeziemmohammedriyadh emergingtechnologiesforsecuringthecloudandinternetofthings AT naceraminaahmed emergingtechnologiesforsecuringthecloudandinternetofthings AT igiglobal emergingtechnologiesforsecuringthecloudandinternetofthings |