Security as a service: real-time intrusion detection in internet of things

S Chawla, G Thamilarasu - Proceedings of the Fifth Cybersecurity …, 2018 - dl.acm.org
With the increase in number of Internet connected devices, security and privacy concerns
are the major obstacles impeding the widespread adoption of Internet of Things (IoT) …

Cloud incident data: An empirical analysis

L Fiondella, SS Gokhale… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
This paper presents an empirical analysis of cloud incidents reported in the Cloutage. org
database. The trend, causes, and impact of three types of incidents, namely, Outage …

Adaptive anomaly identification by exploring metric subspace in cloud computing infrastructures

Q Guan, S Fu - 2013 IEEE 32nd International Symposium on …, 2013 - ieeexplore.ieee.org
Cloud computing has become increasingly popular by obviating the need for users to own
and maintain complex computing infrastructures. However, due to their inherent complexity …

A framework for anomaly detection and classification in Multiple IoT scenarios

F Cauteruccio, L Cinelli, E Corradini… - Future Generation …, 2021 - Elsevier
The investigation of anomalies is an important element in many scientific research fields. In
recent years, this activity has been also extended to social networking and social …

AERF: Adaptive ensemble random fuzzy algorithm for anomaly detection in cloud computing

J Jiang, F Liu, WWY Ng, Q Tang, G Zhong… - Computer …, 2023 - Elsevier
The abnormality of system behavior is inevitable in cloud computing because of its
complexity and scale. How to perform anomaly detection on the system's operating data to …

Use of event detection approaches for outlier detection in wireless sensor networks

M Bahrepour, Y Zhang, N Meratnia… - … on Intelligent Sensors …, 2009 - ieeexplore.ieee.org
Outliers or anomalies are generally considered to be those observations that are
considerably diverged from normal pattern of data. Due to their special characteristics, eg …

Cloud computing data breaches a socio-technical review of literature

D Kolevski, K Michael - … on Green Computing and Internet of …, 2015 - ieeexplore.ieee.org
As more and more personal, enterprise and government data, services and infrastructure
moves to the cloud for storage and processing, the potential for data breaches increases …

A survey on anomalies detection techniques and measurement methods

G Muruti, FA Rahim… - 2018 IEEE conference on …, 2018 - ieeexplore.ieee.org
Dynamic research area has been applied and researched on anomaly detection in various
domains. And various techniques have been proposed to identify unexpected items or …

Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications

W Xiong, H Hu, N Xiong, LT Yang, WC Peng… - Information …, 2014 - Elsevier
Cloud computing represents a new paradigm where computing resources are offered as
services in the world via communication Internet. As many new types of attacks are arising at …

Edge‐based blockchain enabled anomaly detection for insider attack prevention in Internet of Things

YM Tukur, D Thakker, IU Awan - Transactions on Emerging …, 2021 - Wiley Online Library
Abstract Internet of Things (IoT) platforms are responsible for overall data processing in the
IoT System. This ranges from analytics and big data processing to gathering all sensor data …