Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment
S Dalal, P Manoharan, UK Lilhore, B Seth… - Journal of Cloud …, 2023 - Springer
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive
approach is proposed in this assessment to deal with the problem of identifying new …
approach is proposed in this assessment to deal with the problem of identifying new …
A survey on cloud security: concepts, types, limitations, and challenges
MA Omer, AA Yazdeen, HS Malallah… - Journal of Applied …, 2022 - jastt.org
Given the world's current situation with the COVID-19 pandemic, several businesses have
recently encouraged remote working from home. A variety of benefits are provided by cloud …
recently encouraged remote working from home. A variety of benefits are provided by cloud …
Continuous auditing and threat detection in multi-cloud infrastructure
Efficient change control and configuration management is imperative for addressing the
emerging security threats in cloud infrastructure. These threats majorly exploit …
emerging security threats in cloud infrastructure. These threats majorly exploit …
A grey literature review on data stream processing applications testing
Abstract Context: The Data Stream Processing (DSP) approach focuses on real-time data
processing by applying specific techniques for capturing and processing relevant data for on …
processing by applying specific techniques for capturing and processing relevant data for on …
Static-Analysis-Based Solutions to Security Challenges in Cloud-Native Systems: Systematic Mapping Study
Security is a significant priority for cloud-native systems, regardless of the system size and
complexity. Therefore, one must utilize a set of defensive mechanisms or controls to protect …
complexity. Therefore, one must utilize a set of defensive mechanisms or controls to protect …
Resilience Engineering in Cloud Services-Focus on building resilient cloud architectures
S Chinamanagonda - Innovative Computer Sciences …, 2023 - innovatesci-publishers.com
In the rapidly evolving landscape of cloud computing, building resilient architectures has
become a cornerstone for ensuring uninterrupted service delivery and business continuity …
become a cornerstone for ensuring uninterrupted service delivery and business continuity …
A multi-objective bee foraging learning-based particle swarm optimization algorithm for enhancing the security of healthcare data in cloud system
Cloud computing is a potential platform transforming the health sector by allowing clinicians
to monitor patients in real-time using sensor technologies. However, the users tend to …
to monitor patients in real-time using sensor technologies. However, the users tend to …
Trustworthy intrusion detection in e-healthcare systems
F Akram, D Liu, P Zhao, N Kryvinska, S Abbas… - Frontiers in public …, 2021 - frontiersin.org
In Internet of Things (IoT)-based network systems (IoT-net), intrusion detection systems (IDS)
play a significant role to maintain patient health records (PHR) in e-healthcare. IoT-net is a …
play a significant role to maintain patient health records (PHR) in e-healthcare. IoT-net is a …
Enhancing Operational Resilience of Critical Infrastructure Processes Through Chaos Engineering
Modern cyber-physical systems (CPS) are interdependent, mechanical and IT components
that support operations in most of society's critical infrastructures. Time and again history has …
that support operations in most of society's critical infrastructures. Time and again history has …
[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.
SS Pericherla - ISC Int. J. Inf. Secur., 2023 - researchgate.net
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …
internal digital resources and workloads. One major drawback or limitation of cloud …