11 research outputs found

    Malware Detection in Cloud Environment (MDCE)

    No full text
    Since cloud computing technology is growing day by day, it comes with many security problems, especially from threats such as malware. As more services migrate to the cloud architecture, the cloud will become a more appealing target for cyber criminals. In this paper, we present the current threats to the cloud environment, and the proposed detection systems for malware in the cloud environment. We then present a multiple detection system that is aimed at combating the spread of malware by cloud environment

    Security Problems in Cloud Computing

    No full text
    Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work, we provide a comparable study of cloud computing privacy and security concerns. We identify and classify known security threats, cloud vulnerabilities, and attacks

    Security Problems in Cloud Computing

    No full text
    Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work, we provide a comparable study of cloud computing privacy and security concerns. We identify and classify known security threats, cloud vulnerabilities, and attacks

    Security Problems in Cloud Computing

    No full text
    Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work, we provide a comparable study of cloud computing privacy and security concerns. We identify and classify known security threats, cloud vulnerabilities, and attacks

    E-Learning and Students' Motivation: A Research Study on the Effect of E-Learning on Higher Education

    No full text
    The information technology educational programs at most universities in Egypt face many obstacles that can be overcome using technology enhanced learning. An open source Moodle e-learning platform has been implemented at many universities in Egypt, as an aid to deliver e-content and to provide the institution with various possibilities for implementing asynchronous e-learning web-based modules. This paper shows that the use of interactive features of e-learning increases the motivation of the undergraduate students for the learning process

    Reperfusion therapies and in-hospital outcomes for ST-elevation myocardial infarction in Europe: The ACVC-EAPCI EORP STEMI Registry of the European Society of Cardiology

    No full text
    Aims: The aim of this study was to determine the contemporary use of reperfusion therapy in the European Society of Cardiology (ESC) member and affiliated countries and adherence to ESC clinical practice guidelines in patients with ST-elevation myocardial infarction (STEMI). Methods and results: Prospective cohort (EURObservational Research Programme STEMI Registry) of hospitalized STEMI patients with symptom onset <24 h in 196 centres across 29 countries. A total of 11 462 patients were enrolled, for whom primary percutaneous coronary intervention (PCI) (total cohort frequency: 72.2%, country frequency range 0-100%), fibrinolysis (18.8%; 0-100%), and no reperfusion therapy (9.0%; 0-75%) were performed. Corresponding in-hospital mortality rates from any cause were 3.1%, 4.4%, and 14.1% and overall mortality was 4.4% (country range 2.5-5.9%). Achievement of quality indicators for reperfusion was reported for 92.7% (region range 84.8-97.5%) for the performance of reperfusion therapy of all patients with STEMI <12 h and 54.4% (region range 37.1-70.1%) for timely reperfusion. Conclusions: The use of reperfusion therapy for STEMI in the ESC member and affiliated countries was high. Primary PCI was the most frequently used treatment and associated total in-hospital mortality was below 5%. However, there was geographic variation in the use of primary PCI, which was associated with differences in in-hospital mortality
    corecore