Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

S Dalal, P Manoharan, UK Lilhore, B Seth… - Journal of Cloud …, 2023 - Springer
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive
approach is proposed in this assessment to deal with the problem of identifying new …

A survey on cloud security: concepts, types, limitations, and challenges

MA Omer, AA Yazdeen, HS Malallah… - Journal of Applied …, 2022 - jastt.org
Given the world's current situation with the COVID-19 pandemic, several businesses have
recently encouraged remote working from home. A variety of benefits are provided by cloud …

Continuous auditing and threat detection in multi-cloud infrastructure

KA Torkura, MIH Sukmana, F Cheng, C Meinel - Computers & Security, 2021 - Elsevier
Efficient change control and configuration management is imperative for addressing the
emerging security threats in cloud infrastructure. These threats majorly exploit …

A grey literature review on data stream processing applications testing

A Vianna, FK Kamei, K Gama, C Zimmerle… - Journal of Systems and …, 2023 - Elsevier
Abstract Context: The Data Stream Processing (DSP) approach focuses on real-time data
processing by applying specific techniques for capturing and processing relevant data for on …

Static-Analysis-Based Solutions to Security Challenges in Cloud-Native Systems: Systematic Mapping Study

MS Rahaman, A Islam, T Cerny, S Hutton - Sensors, 2023 - mdpi.com
Security is a significant priority for cloud-native systems, regardless of the system size and
complexity. Therefore, one must utilize a set of defensive mechanisms or controls to protect …

Resilience Engineering in Cloud Services-Focus on building resilient cloud architectures

S Chinamanagonda - Innovative Computer Sciences …, 2023 - innovatesci-publishers.com
In the rapidly evolving landscape of cloud computing, building resilient architectures has
become a cornerstone for ensuring uninterrupted service delivery and business continuity …

A multi-objective bee foraging learning-based particle swarm optimization algorithm for enhancing the security of healthcare data in cloud system

RR Irshad, SS Sohail, S Hussain, DØ Madsen… - IEEE …, 2023 - ieeexplore.ieee.org
Cloud computing is a potential platform transforming the health sector by allowing clinicians
to monitor patients in real-time using sensor technologies. However, the users tend to …

Trustworthy intrusion detection in e-healthcare systems

F Akram, D Liu, P Zhao, N Kryvinska, S Abbas… - Frontiers in public …, 2021 - frontiersin.org
In Internet of Things (IoT)-based network systems (IoT-net), intrusion detection systems (IDS)
play a significant role to maintain patient health records (PHR) in e-healthcare. IoT-net is a …

Enhancing Operational Resilience of Critical Infrastructure Processes Through Chaos Engineering

P Dedousis, G Stergiopoulos, G Arampatzis… - IEEE …, 2023 - ieeexplore.ieee.org
Modern cyber-physical systems (CPS) are interdependent, mechanical and IT components
that support operations in most of society's critical infrastructures. Time and again history has …

[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.

SS Pericherla - ISC Int. J. Inf. Secur., 2023 - researchgate.net
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …