Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment
暂无分享,去创建一个
[1] Mark Campbell,et al. Beyond Zero Trust: Trust Is a Vulnerability , 2020, Computer.
[2] Saiful Islam,et al. Feature Evaluation for Learning Underlying Data-Processing to Enhance Cloud Trust Through Rich Models , 2020 .
[3] Ning Sun,et al. Steganalysis by Recombining Spatial Rich Model , 2019, IOP Conference Series: Materials Science and Engineering.
[4] Paul Jacob,et al. Access Control Policy Enforcement for Zero-Trust-Networking , 2018, 2018 29th Irish Signals and Systems Conference (ISSC).
[5] Larry S. Davis,et al. Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[6] Tiberio Uricchio,et al. Tracing images back to their social network of origin: A CNN-based approach , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[7] Larry S. Davis,et al. Two-Stream Neural Networks for Tampered Face Detection , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[8] Roberto Caldelli,et al. Image Origin Classification Based on Social Network Provenance , 2017, IEEE Transactions on Information Forensics and Security.
[9] Davide Cozzolino,et al. Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection , 2017, IH&MMSec.
[10] Jiangqun Ni,et al. A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[11] Shuai Ding,et al. Trust-Enhanced Cloud Service Selection Model Based on QoS Analysis , 2015, PloS one.
[12] Davide Cozzolino,et al. Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[13] Tim Storer,et al. Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics , 2014, Int. J. Digit. Crime Forensics.
[14] Alexander Shraer,et al. Verifying cloud services: present and future , 2013, OPSR.
[15] Ali Dehghantanha,et al. Cloud Forensics Issues and Opportunities , 2013 .
[16] Alan T. Sherman,et al. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques , 2012, Digit. Investig..
[17] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[18] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[19] George Candea,et al. The S2E Platform: Design, Implementation, and Applications , 2012, TOCS.
[20] Guojun Lu,et al. An Improved Curvature Scale-Space Corner Detector and a Robust Corner Matching Approach for Transformed Image Identification , 2008, IEEE Transactions on Image Processing.
[21] James C. King,et al. A new approach to program testing , 1974, Programming Methodology.
[22] Jason Garbis,et al. What Is Zero Trust? , 2021, Zero Trust Security.
[23] Saiful Islam,et al. Learning Rich Features from Software-as-a-Service Cloud Computing for Detecting Trust Violations , 2020, Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019), NITTTR Chandigarh, India.
[24] Huijuan Wang,et al. Survey on Zero-Trust Network Security , 2020 .
[25] M. R. Warsi,et al. Trust Management Issues in Cloud Computing Ecosystems , 2019, Social Science Research Network.
[26] Sreejith Keeriyattil,et al. Microsegmentation and Zero Trust: Introduction , 2019, Zero Trust Networks with VMware NSX.
[27] Tuva Selstad Dybedokken. Trust Management in Fog Computing , 2017 .
[28] Elizabeth Chang,et al. TRUST-EVALUATION METRIC FOR CLOUD APPLICATIONS , 2011 .