Artificial Intelligence Trust, risk and security management (AI trism): Frameworks, applications, challenges and future research directions

A Habbal, MK Ali, MA Abuzaraida - Expert Systems with Applications, 2024 - Elsevier
Artificial Intelligence (AI) has become pervasive, enabling transformative advancements in
various industries including smart city, smart healthcare, smart manufacturing, smart virtual …

Distributed Systems for Artificial Intelligence in Cloud Computing: A Review of AI-Powered Applications and Services

HM Zangana, SRM Zeebaree - International Journal of Informatics …, 2024 - ojs.unikom.ac.id
The synergy of distributed frameworks with Artificial Intelligence (AI) is pivotal for advancing
applications in cloud computing. This review focuses on AI-powered applications in …

A Qualitative Study of App Acquisition and Management

H Elahi, G Wang, W Jiang, A Bartel… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Smartphone users rely on Apps for their daily lives but simultaneously struggle to protect
their privacy and device security from potentially harmful and malicious Apps. However …

Construction of smart campus cloud service platform based on big data computer system

C Xie - Procedia Computer Science, 2022 - Elsevier
At present, universities are facing a critical period of transition from digital campus to smart
campus. Because cloud service data has the characteristics of diversity, in addition to …

Risk Assessment Method of Cloud Environment

M Zbořil - Computing and Informatics, 2022 - cai.sk
Cloud technology usage in nowadays companies constantly grows every year. Moreover,
the COVID-19 situation caused even a higher acceleration of cloud adoption. A higher …

[PDF][PDF] Systematic Literature Review of Threat Modeling Concepts.

PA Lohmann, C Albuquerque, R Machado - ICISSP, 2023 - scitepress.org
Threat Modeling (TM) has increased its relevance in cybersecurity risk management applied
to software development, allowing developers to proactively identify and mitigate threats …

Artificial intelligence for system security assurance: A systematic literature review

SF Wen, A Shukla, B Katt - 2024 - researchsquare.com
Abstract System Security Assurance (SSA) has emerged as a critical methodology for
organizations to verify the trustworthiness of their systems by evaluating security measures …

Data-Driven Risk Modelling of Cyber-Physical Systems

S Ahamad, R Gupta, M Sajid - Intelligent Techniques for Cyber …, 2023 - taylorfrancis.com
A cyber-physical system (CPS) connects physical infrastructure and items to the internet and
to one another by integrating networking, control, computation, and sensing into the physical …

How the MITRE ATT&CK Framework can be used for Threat Modelling in the Cloud

MH Tran - 2023 - ntnuopen.ntnu.no
The primary objective of this thesis is to improve the security of cloud infrastructures by
addressing vulnerabilities and weaknesses in an early stage, preferably in design phase …

Risk assessment processes for big data based on cloud computing technologies: a comparative study

FMM Fataftah - 2022 - repository.nwu.ac.za
In recent years, the use of big data has dramatically increased in a variety of fields, for
example, healthcare and management, among others. Because of the growing number of …