Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions
In cloud computing environment, the workflow allocation mainly focuses on task assignment
to satisfy the quality-of-service (QoS) standards and workload balancing by the best use of …
to satisfy the quality-of-service (QoS) standards and workload balancing by the best use of …
Enhancing Cybersecurity through Automated Infrastructure Management: A Comprehensive Study on Optimizing Security Measures
A Yaseen - Quarterly Journal of Emerging Technologies and …, 2024 - vectoral.org
The present research discusses the integration of automated infrastructure management
(AIM) in fortifying cybersecurity measures within organizational settings. The study employs …
(AIM) in fortifying cybersecurity measures within organizational settings. The study employs …
Synthesizing AI'S impact on cybersecurity in telecommunications: a conceptual framework
PO Shoetan, OO Amoo, ES Okafor… - Computer Science & IT …, 2024 - fepbl.com
As the telecommunications sector increasingly relies on interconnected digital infrastructure,
the proliferation of cyber threats poses significant challenges to security and operational …
the proliferation of cyber threats poses significant challenges to security and operational …
Cyber resilience framework: Strengthening defenses and enhancing continuity in business security
A AL-Hawamleh - International Journal of Computing and Digital …, 2024 - journal.uob.edu.bh
This study presents a comprehensive Cybersecurity Resilience Framework designed to
fortify organizational defenses against the evolving landscape of cyber threats while …
fortify organizational defenses against the evolving landscape of cyber threats while …
Cloud computing: architecture, vision, challenges, opportunities, and emerging trends
Cloud computing stands at the forefront of a technological revolution, fundamentally altering
the provisioning, utilization, and administration of computing resources. This paper conducts …
the provisioning, utilization, and administration of computing resources. This paper conducts …
[HTML][HTML] Enhanced Intrusion Detection with LSTM-Based Model, Feature Selection, and SMOTE for Imbalanced Data
HR Sayegh, W Dong, AM Al-madani - Applied Sciences, 2024 - mdpi.com
This study introduces a sophisticated intrusion detection system (IDS) that has been
specifically developed for internet of things (IoT) networks. By utilizing the capabilities of …
specifically developed for internet of things (IoT) networks. By utilizing the capabilities of …
Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence
SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …
Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes
IoTs are increasingly gaining popularity and prevalence due to their extensive applications
across various domains. They gather data from the real environment and transmit it through …
across various domains. They gather data from the real environment and transmit it through …
A hybrid approach for optimizing software defect prediction using a grey wolf optimization and multilayer perceptron
Purpose Software defect prediction (SDP) is a critical aspect of software quality assurance,
aiming to identify and manage potential defects in software systems. In this paper, we have …
aiming to identify and manage potential defects in software systems. In this paper, we have …
Impact of the assertive and advisory role of internal auditing on proactive measures to enhance cybersecurity: evidence from GCC
HE Elmaasrawy, OI Tawfik - Journal of Science and Technology …, 2024 - emerald.com
Purpose This paper aims to examine the impact of the assurance and advisory role of
internal audit (ADRIA) on organisational, human and technical proactive measures to …
internal audit (ADRIA) on organisational, human and technical proactive measures to …