


default search action
Journal of Cloud Computing, Volume 15
Volume 15, Number 1, December 2026
- Yanjie Li, Ali Fayazi, Hossein Ghayoumi Zadeh:

Federated knowledge graph-based hybrid personalized curriculum recommendation for privacy-preserving physical education teaching systems. 1 - Yufang Han, Mengyao Gu, Xinsheng Xu:

Flexible evaluation method based on personalized evaluation requirements for cloud manufacturing services. 2 - Yangwenting Xu, Yong Wang, Feng Jiang, Fei Zhou, Junqi Chen:

Data repair optimization method for geo-distributed fault-tolerant storage systems based on whale optimization algorithm. 3 - Xifeng Xu, Yunni Xia, Qinglan Peng, Mengdi Wang, Yang Yu, Jiale Zhao:

A novel satellite application deployment method in Satellite Constellation through Inter-Satellite Links. 4 - Nahita Pathania, Balraj Singh, Isha Batra, Deepak Prashar, Arfat Ahmad Khan, Seifedine Kadry:

FireBat: a hybrid approach for load balancing in cloud computing. 5 - Chinmayee Rout, Srinivas Sethi, Jenamani Chandrakanta Badajena, Ramesh Kumar Sahoo

:
FSEGM: feature selection and ensemble generative model for adaptive cloud security. 6 - Peng Peng, Mohammad Mahdi Moghimi:

Hash-based lightweight recommendation in edge computing for privacy-preserving sport communities. 7 - Hazem Moh'd Said Hatamleh, As'ad Mahmoud As'ad Alnaser, Said S. Saloum, Zahi A. Abu Sarhan

, Jawdat S. Alkasassbeh:
Optimized dynamic resource allocation in quantum networks for secure and efficient wireless communication. 8 - João Carvalheiro, Rui Valadas

, Marlon Paz, Hélder Barata, Sérgio Santos:
Kubernetes-aware load balancing for leaf-spine EVPN data centers. 9 - Kai Peng, Kunkun Yue, Peiyun Xiao, Victor C. M. Leung:

Security-aware computation offloading in internet of vehicles: a multi-agent reinforcement learning algorithm with attention mechanism. 10 - Anayo Chukwu Ikegwu

, Jasmine Chifurumnanya Nnabue, Annastasia Shako Kinse, Uzoma Rita Alo:
A survey of cyber threat intelligence in embedded system driven security for mobile health systems. 11 - Zongda Wu, Jian Xie, Huawen Liu, Huxiong Li, Guandong Xu, Gang Li:

A framework based on edge computing and identity replacement for the protection of user information service privacy. 12 - Olanrewaju L. Abraham, Md. Asri Ngadi, Johan Mohamad Sharif, Mohd Kufaisal Mohd Sidik:

A chaotic local search-based dwarf mongoose optimization algorithm for multi-objective task scheduling in cloud computing. 13 - Xin Zhao, Wenhui Sun, Edris Khezri:

Edge computing-enabled scalable health training log analysis with locality-sensitive hashing for similarity search. 14 - Jingchao Tan, Tiancheng Zhang, Cheng Zhang, Chenyang Wang, Xiuhua Li, Xiaofei Wang:

Energy-efficient user allocation and cache updating in mobile edge computing networks based on user geographical aggregation. 15 - Faisal S. Alsubaei:

Luminous defense: XAI-driven adaptive security for critical IoT infrastructures. 16 - Duan Xue, Xingying Huo, Ta Li, Peng Qin:

Dynamic task assignment for edge computing-enabled vehicular mobile crowdsensing. 17 - N. Mathivanan, B. Lanitha:

An integrated methodology for intrusion detection and mitigation to optimize cloud security. 18 - Yingquan Chen, Qianmu Li, Wenhao Zhang, He Zhu, Peng Li, Wei Sun:

WSMS: weakly supervised multi-feature steganalysis with EVT calibration for cloud-edge collaborative intelligence. 19 - José A. P. Martins, Paulo A. L. Rego, José A. F. de Macêdo, Francisco Airton Silva, Vinícius Lagrota:

Matrix protocol: a comprehensive systematic mapping study. 20 - Xun Zhao, Yunping Liu, Shuaihui Zhu, Tingting Zhang, Yiguang Gong, Liansheng Li:

Multi-stage task allocation strategy for UAV clusterin multi-object tracking. 21 - Rrezearta Thaqi, Gabriele Lenzini, Marcus Völp, Blerim Rexha:

Online machine learning for proactive threat intelligence and timely DDoS attack prediction. 22 - Yike Yuan, Xinkui Zhao, Shuyi Yu, Shengye Pang, Guobing Zou:

GuardChain: multi-stage trust framework for FL-empowered AIGC. 23 - Dinesh Kumar Nishad, Rashmi Singh, Saifullah Khalid:

A lightweight blockchain-enabled federated intrusion prevention framework for resource-constrained industrial IoT devices to detect and mitigate emerging cyberattacks. 24 - Xiaorui Song, Mingling Shang, Reza Khosravi:

Adaptive rescaling technique for portable vision devices in IoMT toward swimming workouts training and safety. 25 - Zishun Rui, Shengjie Chen, Shucun Fu, Wenzheng Sun, Shengjun Xue:

Advancing faithful KBQA services via prompt-driven knowledge graph-enhanced LLMs in cloud. 26 - Joel Herve Mboussam Emati

, Vianney Kengne Tchendji
, Mounirah Djam-Doudou
:
A zero-trust decentralized identifier specification based machine learning against cyber-attacks in blockchain based self-sovereign identity. 27 - Ankush Mehra, Gurpreet Singh, Ahmad Almogren, Sumit Badotra, Vishnu Kant, Seada Hussen, Ateeq Ur Rehman:

SAE-CNN-LSTM-based anomaly detection and mitigation framework for cloud-centric SDN environments. 28

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














