[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends

MM Belal, DM Sundaram - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …

Introspecting intrusion detection systems in dealing with security concerns in cloud environment

J Snehi, M Snehi, A Bhandari… - … on System Modeling …, 2021 - ieeexplore.ieee.org
Cloud computing is one of the most quickly developing computing advances in today's IT
environment. The cloud infrastructure links data and software from different geographically …

Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems

M Snehi, A Bhandari, J Verma - Computers & Security, 2024 - Elsevier
Introduction The convergence of the Internet of Anything (IoX), software-defined
communication layer, and sophisticated cloud platform has steered the dawn of the fourth …

Trinetra: a solution to handle cross-VM time-driven attack

DH Buch, HS Bhatt - SN Applied Sciences, 2020 - Springer
The efficient utilization of hardware and software resources plays a vital role in a high-
performance computing environment. Where on the one side, a shared pool of resources …

IMPROVING SECURITY FOR VIRTUAL MACHINES IN CLOUD VIRTUALIZATION

Z Taj, MG Rangaswamy - INTERNATIONAL JOURNAL OF COMPUTER …, 2024 - mylib.in
Cloud computing is a prominent developing technology that primarily focuses on data
storage and the provision of on-demand computer resources for diverse applications. Users …

[PDF][PDF] TOPICS DISTRIBUTION OF CYBERSECURITY TAXONOMIES: A SURVEY OF SURVEYS AND A CONTENT ANALYSIS

S He, F Lin, J Zhu - The 30th Annual Conference of the International …, 2019 - iima.org
Concepts and terms are always considered to be most critical for a fundamental
understanding of the theories and practices of information technology in cybersecurity …