Artificial Intelligence Trust, risk and security management (AI trism): Frameworks, applications, challenges and future research directions
Artificial Intelligence (AI) has become pervasive, enabling transformative advancements in
various industries including smart city, smart healthcare, smart manufacturing, smart virtual …
various industries including smart city, smart healthcare, smart manufacturing, smart virtual …
Distributed Systems for Artificial Intelligence in Cloud Computing: A Review of AI-Powered Applications and Services
HM Zangana, SRM Zeebaree - International Journal of Informatics …, 2024 - ojs.unikom.ac.id
The synergy of distributed frameworks with Artificial Intelligence (AI) is pivotal for advancing
applications in cloud computing. This review focuses on AI-powered applications in …
applications in cloud computing. This review focuses on AI-powered applications in …
A Qualitative Study of App Acquisition and Management
Smartphone users rely on Apps for their daily lives but simultaneously struggle to protect
their privacy and device security from potentially harmful and malicious Apps. However …
their privacy and device security from potentially harmful and malicious Apps. However …
Construction of smart campus cloud service platform based on big data computer system
C Xie - Procedia Computer Science, 2022 - Elsevier
At present, universities are facing a critical period of transition from digital campus to smart
campus. Because cloud service data has the characteristics of diversity, in addition to …
campus. Because cloud service data has the characteristics of diversity, in addition to …
Risk Assessment Method of Cloud Environment
M Zbořil - Computing and Informatics, 2022 - cai.sk
Cloud technology usage in nowadays companies constantly grows every year. Moreover,
the COVID-19 situation caused even a higher acceleration of cloud adoption. A higher …
the COVID-19 situation caused even a higher acceleration of cloud adoption. A higher …
[PDF][PDF] Systematic Literature Review of Threat Modeling Concepts.
PA Lohmann, C Albuquerque, R Machado - ICISSP, 2023 - scitepress.org
Threat Modeling (TM) has increased its relevance in cybersecurity risk management applied
to software development, allowing developers to proactively identify and mitigate threats …
to software development, allowing developers to proactively identify and mitigate threats …
Artificial intelligence for system security assurance: A systematic literature review
SF Wen, A Shukla, B Katt - 2024 - researchsquare.com
Abstract System Security Assurance (SSA) has emerged as a critical methodology for
organizations to verify the trustworthiness of their systems by evaluating security measures …
organizations to verify the trustworthiness of their systems by evaluating security measures …
Data-Driven Risk Modelling of Cyber-Physical Systems
A cyber-physical system (CPS) connects physical infrastructure and items to the internet and
to one another by integrating networking, control, computation, and sensing into the physical …
to one another by integrating networking, control, computation, and sensing into the physical …
How the MITRE ATT&CK Framework can be used for Threat Modelling in the Cloud
MH Tran - 2023 - ntnuopen.ntnu.no
The primary objective of this thesis is to improve the security of cloud infrastructures by
addressing vulnerabilities and weaknesses in an early stage, preferably in design phase …
addressing vulnerabilities and weaknesses in an early stage, preferably in design phase …
Risk assessment processes for big data based on cloud computing technologies: a comparative study
FMM Fataftah - 2022 - repository.nwu.ac.za
In recent years, the use of big data has dramatically increased in a variety of fields, for
example, healthcare and management, among others. Because of the growing number of …
example, healthcare and management, among others. Because of the growing number of …