A survey on resiliency techniques in cloud computing infrastructures and applications

C Colman-Meixner, C Develder… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Today's businesses increasingly rely on cloud computing, which brings both great
opportunities and challenges. One of the critical challenges is resiliency: disruptions due to …

On resilience in cloud computing: A survey of techniques across the cloud domain

T Welsh, E Benkhelifa - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cloud infrastructures are highly favoured as a computing delivery model worldwide, creating
a strong societal dependence. It is therefore vital to enhance their resilience, providing …

Systematic identification of threats in the cloud: A survey

JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais… - Computer Networks, 2019 - Elsevier
When a vulnerability is discovered in a system, some key questions often asked by the
security analyst are what threat (s) does it pose, what attacks may exploit it, and which parts …

Managed containers: A framework for resilient containerized mission critical systems

XM Aguilera, C Otero, M Ridley… - 2018 IEEE 11th …, 2018 - ieeexplore.ieee.org
Traditional defense mechanisms are insufficient for protecting containerized mission critical
systems. These systems are mostly based on cloud-based images (eg, Docker) that need to …

SecIngress: an API gateway framework to secure cloud applications based on N-variant system

D Zhou, H Chen, G Cheng, W He… - China Communications, 2021 - ieeexplore.ieee.org
Based on the diversified technology and the cross-validation mechanism, the N-variant
system provides a secure service architecture for cloud providers to protect the cloud …

Protecting critical cloud infrastructures with predictive capability

SS Yau, AB Buduru, V Nagaraja - 2015 IEEE 8th International …, 2015 - ieeexplore.ieee.org
Emerging trends in cyber system security breaches, including those in critical infrastructures
involving cloud systems, such as in applications of military, homeland security, finance …

[HTML][HTML] An automated consistency management approach for a privacy-aware electric vehicle architecture

J Stancke, C Plappert, L Jäger - Microprocessors and Microsystems, 2024 - Elsevier
Modern vehicles contain a number of highly connected embedded systems that generate,
store, and process information and exchange it with their environment. Since a large part of …

Towards a privacy-aware electric vehicle architecture

C Plappert, J Stancke, L Jäger - 2022 30th Euromicro …, 2022 - ieeexplore.ieee.org
Connected vehicles need to generate, store, process, and exchange a multitude of
information with their environment. Much of this information is privacy-critical and thus …

nm-variant systems: Adversarial-resistant software rejuvenation for cloud-based web applications

I Polinsky, K Martin, W Enck, MK Reiter - Proceedings of the Tenth ACM …, 2020 - dl.acm.org
Web servers are a popular target for adversaries as they are publicly accessible and often
vulnerable to compromise. Compromises can go unnoticed for months, if not years, and …

Secure data communication in client-cloud environment: A survey

D Soni, M Kumar - 2017 7th International Conference on …, 2017 - ieeexplore.ieee.org
The use of cloud computing platform is growing now days. It is used in all the area of
Education, Business, Web Domain and Data Servers. The developing interest is a direct …