Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions

M Alam, M Shahid, S Mustajab - The Journal of Supercomputing, 2024 - Springer
In cloud computing environment, the workflow allocation mainly focuses on task assignment
to satisfy the quality-of-service (QoS) standards and workload balancing by the best use of …

Enhancing Cybersecurity through Automated Infrastructure Management: A Comprehensive Study on Optimizing Security Measures

A Yaseen - Quarterly Journal of Emerging Technologies and …, 2024 - vectoral.org
The present research discusses the integration of automated infrastructure management
(AIM) in fortifying cybersecurity measures within organizational settings. The study employs …

Synthesizing AI'S impact on cybersecurity in telecommunications: a conceptual framework

PO Shoetan, OO Amoo, ES Okafor… - Computer Science & IT …, 2024 - fepbl.com
As the telecommunications sector increasingly relies on interconnected digital infrastructure,
the proliferation of cyber threats poses significant challenges to security and operational …

Cyber resilience framework: Strengthening defenses and enhancing continuity in business security

A AL-Hawamleh - International Journal of Computing and Digital …, 2024 - journal.uob.edu.bh
This study presents a comprehensive Cybersecurity Resilience Framework designed to
fortify organizational defenses against the evolving landscape of cyber threats while …

Cloud computing: architecture, vision, challenges, opportunities, and emerging trends

M Alam, S Mustajab, M Shahid… - … , and Intelligent Systems …, 2023 - ieeexplore.ieee.org
Cloud computing stands at the forefront of a technological revolution, fundamentally altering
the provisioning, utilization, and administration of computing resources. This paper conducts …

[HTML][HTML] Enhanced Intrusion Detection with LSTM-Based Model, Feature Selection, and SMOTE for Imbalanced Data

HR Sayegh, W Dong, AM Al-madani - Applied Sciences, 2024 - mdpi.com
This study introduces a sophisticated intrusion detection system (IDS) that has been
specifically developed for internet of things (IoT) networks. By utilizing the capabilities of …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes

S Ali, F Anwer - International Journal of Information Technology, 2024 - Springer
IoTs are increasingly gaining popularity and prevalence due to their extensive applications
across various domains. They gather data from the real environment and transmit it through …

A hybrid approach for optimizing software defect prediction using a grey wolf optimization and multilayer perceptron

M Mustaqeem, S Mustajab, M Alam - International Journal of …, 2024 - emerald.com
Purpose Software defect prediction (SDP) is a critical aspect of software quality assurance,
aiming to identify and manage potential defects in software systems. In this paper, we have …

Impact of the assertive and advisory role of internal auditing on proactive measures to enhance cybersecurity: evidence from GCC

HE Elmaasrawy, OI Tawfik - Journal of Science and Technology …, 2024 - emerald.com
Purpose This paper aims to examine the impact of the assurance and advisory role of
internal audit (ADRIA) on organisational, human and technical proactive measures to …