Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Multi-layered access control based auto tuning relational key implications in enterprise-level multi-tenancy
This article discusses the importance of cloud-based multi-tenancy in private–public-private secure cloud environments, which is achieved through the isolation of end-user data and resources into tenants to en...
-
Article
Open AccessIntrusion detection systems for wireless sensor networks using computational intelligence techniques
Network Intrusion Detection Systems (NIDS) are utilized to find hostile network connections. This can be accomplished by looking at traffic network activity, but it takes a lot of work. The NIDS heavily utiliz...