[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends
MM Belal, DM Sundaram - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …
active security techniques instead of traditional ones to secure the cloud environment based …
Introspecting intrusion detection systems in dealing with security concerns in cloud environment
Cloud computing is one of the most quickly developing computing advances in today's IT
environment. The cloud infrastructure links data and software from different geographically …
environment. The cloud infrastructure links data and software from different geographically …
Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems
M Snehi, A Bhandari, J Verma - Computers & Security, 2024 - Elsevier
Introduction The convergence of the Internet of Anything (IoX), software-defined
communication layer, and sophisticated cloud platform has steered the dawn of the fourth …
communication layer, and sophisticated cloud platform has steered the dawn of the fourth …
Trinetra: a solution to handle cross-VM time-driven attack
DH Buch, HS Bhatt - SN Applied Sciences, 2020 - Springer
The efficient utilization of hardware and software resources plays a vital role in a high-
performance computing environment. Where on the one side, a shared pool of resources …
performance computing environment. Where on the one side, a shared pool of resources …
IMPROVING SECURITY FOR VIRTUAL MACHINES IN CLOUD VIRTUALIZATION
Z Taj, MG Rangaswamy - INTERNATIONAL JOURNAL OF COMPUTER …, 2024 - mylib.in
Cloud computing is a prominent developing technology that primarily focuses on data
storage and the provision of on-demand computer resources for diverse applications. Users …
storage and the provision of on-demand computer resources for diverse applications. Users …
[PDF][PDF] TOPICS DISTRIBUTION OF CYBERSECURITY TAXONOMIES: A SURVEY OF SURVEYS AND A CONTENT ANALYSIS
S He, F Lin, J Zhu - The 30th Annual Conference of the International …, 2019 - iima.org
Concepts and terms are always considered to be most critical for a fundamental
understanding of the theories and practices of information technology in cybersecurity …
understanding of the theories and practices of information technology in cybersecurity …