Transactions on Scalable Information
Systems, Vol. 9, No. 22, 2022.
https://doi.org/10.4108/eai.3-11-2021.171758
[10] SecurityLab, Operating system, 2022.
sakibhttps://www.securitylab.ru/news/tags/%
EE%EF%E5%F0%E0%F6%E8%EE%ED%E
D%E0%FF+%F1%E8%F1%F2%E5%EC%E
0/
[11] K. T. Akhter Md Hasib, I. Chowdhury, S.
Sakib, M. Monirujjaman Khan, N. Alsufyani,
A. Alsufyani, S. Bourouis, Electronic Health
Record Monitoring System and Data Security
Using Blockchain Technology, Security and
Communication Network, Security and
Networking for Healthcare Information
Exchange and Storage in the Big Data
Ecosystem, Vol. 2022, Art. 2366632, 2022.
[12] R. Nivedhaa, J. Justus, A Secure Erasure
Cloud Storage System Using Advanced
Encryption Standard Algorithm and Proxy
Re-Encryption, Proceedings of the 2018 IEEE
International Conference on Communication
and Signal Processing, (ICCSP), 2018.
https://doi.org/10.1109/ICCSP.2018.8524257
[13] D. Girish Kumar, Rajashree V. Biradar, V. C.
Patil, Multiple Authority Based Data
Fragmentation Technique for Providing
Secure Storage in Cloud, International
Journal of Recent Technology and
Engineering, Vol. 8, No. 4, pp. 4822-4825,
2019.
[14] Q. Youssef, M. Yassine, A. Haqiq, Secure
Software Defined Networks Controller
Storage using Intel Software Guard
Extensions, International Journal of
Advanced Computer Science and
Applications, Vol. 11, No. 10, 2020.
[15] M. Khalilian, M. Fathi Ahmadsaraei, L.
Farajpour, Security threats and their
mitigation in big data recommender systems,
Big Data Recommender Systems: Algorithms,
Architectures, Big Data, Security and Trust,
2019.
[16] D. Godlove, Singularity: Simple, Secure
Containers for Compute-Driven Workloads,
Proceedings of the Practice and Experience in
Advanced Research Computing on Rise of the
Machines (Learning), Art. 24, pp. 1-4, 2019.
[17] A. Ayub, H. Yoo, I. Ahmed, Empirical Study
of PLC Authentication Protocols in Industrial
Control Systems, Proceedings - 2021 IEEE
Symposium on Security and Privacy
Workshops (SPW), 2021.
[18] O. Hammoud, I. Tarkhanov, A. Kosmarski,
An architecture for distributed electronic
documents storage in decentralized
blockchain B2B applications, Computers,
Vol. 10, No. 11, 2021.
https://doi.org/10.3390/computers10110142
[19] G. Kalaiarasi P. Geetha, M. Thamizharasi, R.
Reni Hena Helan, G. Abirami, Task Scheduler
of Sending Electronic Mails Automatically,
International Journal of Engineering and
Advanced Technology, Vol. 9, No. 4, pp.
1303-1306, 2020.
[20] A. L. Zolkin, A. N. Losev, D. V. Gridina, T.
G. Aygumov, Research of problems of
computer networks expert systems, IOP
Conference Series: Materials Science and
Engineering, Vol. 1047, No. 1, 012106, 2021.
[21] S. Hiremath, S. R. Kunte, Ensuring Cloud
Data Security using Public Auditing with
Privacy Preserving, Proceedings of the 3rd
International Conference on Communication
and Electronics Systems, (ICCES), pp. 1100-
1105, 2018.
[22] A. Brandão, J. S. Resende, R. Martins,
Employment of Secure Enclaves in Cheat
Detection Hardening, Lecture Notes in
Computer Science (including subseries
Lecture Notes in Artificial Intelligence and
Lecture Notes in Bioinformatics), 2020.
[23] N. A. Hassan, Data Hiding Techniques in
Windows OS - Data Hiding Techniques in
Windows OS, Syngress, 2017.
[24] W. Jianhong, Dynamic Programming in Data
Driven Model Predictive Control?, WSEAS
Transactions on Systems, Vol. 20, pp. 170-
177, 2021.
[25] R. Messier, Operating System Forensics,
Syngress, 2017.
[26] R. Fox, Linux with Operating System
Concepts, Chapman and Hall/CRC, 2021.
Creative Commons Attribution License 4.0
(Attribution 4.0 International, CC BY 4.0)
This article is published under the terms of the
Creative Commons Attribution License 4.0
https://creativecommons.org/licenses/by/4.0/deed.en
_US
WSEAS TRANSACTIONS on SYSTEMS
DOI: 10.37394/23202.2022.21.24