Security and privacy in cloud computing: technical review
YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …
to the popularity and success of cloud computing. Cloud computing offers advantages and …
Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment
DK Jain, W Ding, K Kotecha - International Journal of Machine Learning …, 2023 - Springer
Cloud computing (CC) has become one of the prominent technologies because of the
significant utility services, which focus on outsourcing data to companies and individual …
significant utility services, which focus on outsourcing data to companies and individual …
Secure attack detection framework for hierarchical 6G-enabled internet of vehicles
H Sedjelmaci, N Kaaniche… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The Sixth Generation Heterogeneous Network (6G HetNet) is a global interconnected
system that serves a myriad variety of applications and services across multiple domains …
system that serves a myriad variety of applications and services across multiple domains …
Human-in-the-loop-aided privacy-preserving scheme for smart healthcare
Nowadays, artificial intelligence (AI) has become the core technology for numerous
application fields ranging from self-driving cars to smart cities. Smart healthcare, as an …
application fields ranging from self-driving cars to smart cities. Smart healthcare, as an …
Oblivious network intrusion detection systems
A main function of network intrusion detection systems (NIDSs) is to monitor network traffic
and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but …
and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but …
EVAD: encrypted vibrational anomaly detection with homomorphic encryption
A Falcetta, M Roveri - Neural Computing and Applications, 2024 - Springer
One of the main concerns of cloud-based services based on machine and deep learning
algorithms is the privacy of users' data. This is particularly relevant when companies want to …
algorithms is the privacy of users' data. This is particularly relevant when companies want to …
A Privacy-Preserving Graph Neural Network for Network Intrusion Detection
With the ever-growing attention on communication security, machine learning-based
network intrusion detection system (NIDS) is widely utilized to meet different security …
network intrusion detection system (NIDS) is widely utilized to meet different security …
Efficient and privacy-preserving collaborative intrusion detection using additive secret sharing and differential privacy
L Mokry, P Slife, P Bishop, J Quiroz… - … Conference on Big …, 2021 - ieeexplore.ieee.org
Intrusion Detection Systems are commonly used by organizations to monitor network traffic
and detect attacks or suspicious behaviours. However, many attacks occur across …
and detect attacks or suspicious behaviours. However, many attacks occur across …
Efficient hybrid model for intrusion detection systems
N Kaaniche, A Boudguiga… - … Conference on Security …, 2022 - hal.science
This paper proposes a new hybrid ML model that relies on both K-Means clustering and the
Variational Bayesian Gaussian Mixture model to efficiently detect unknown network attacks …
Variational Bayesian Gaussian Mixture model to efficiently detect unknown network attacks …
Oblivious intrusion detection system
Intrusion Detection Systems (IDSs) are capable of monitoring network traffic and matching it
against rules. Obliv-ious IDSs perform the same tasks of IDSs while using encrypted rules …
against rules. Obliv-ious IDSs perform the same tasks of IDSs while using encrypted rules …