Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …

Next-generation blockchain-enabled virtualized cloud security solutions: review and open challenges

M Uddin, A Khalique, AK Jumani, SS Ullah, S Hussain - Electronics, 2021 - mdpi.com
Cloud computing is a well-known technology that provides flexible, efficient, and cost-
effective IT solutions for multinationals to offer improved and enhanced quality of business …

Towards a security reference architecture for NFV

AK Alnaim, AM Alwakeel, EB Fernandez - Sensors, 2022 - mdpi.com
Network function virtualization (NFV) is an emerging technology that is becoming
increasingly important due to its many advantages. NFV transforms legacy hardware-based …

[PDF][PDF] Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective.

M Abu-Alhaija, NM Turab… - … Systems Science & …, 2022 - cdn.techscience.cn
Infrastructure as a Service (IaaS) provides logical separation between data, network,
applications and machines from the physical constrains of real machines. IaaS is one of the …

Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security

AK Alnaim - International Journal of Information Security, 2024 - Springer
Abstract 5G, the current generation of communication networks is based on the standards
defined by 3GPP and other organizations (ETSI, ENISA, NGMN). These standards define …

Securing the Future of Web-Enabled IoT: A Critical Analysis of Web of Things Security.

KM Albarrak - Applied Sciences (2076-3417), 2024 - search.ebscohost.com
Abstract The Web of Things (WoT) represents a significant advancement on the Internet of
Things (IoT), where web technologies are integrated to enhance device interoperability and …

DDQN-SFCAG: A service function chain recovery method against network attacks in 6G networks

D Zhou, X Ji, W You, H Qiu, Y Zhao, M Xu - Computer Networks, 2024 - Elsevier
Abstract Service Function Chain (SFC) as an effective solution can satisfy the diverse
service requirements of six application scenarios in Network Function Virtualization (NFV) …

容器云中基于信号博弈的容器迁移与蜜罐部署策略

李凌书, 邬江兴, 曾威, 刘文彦 - 网络与信息安全学报, 2022 - infocomm-journal.com
SaaS 云中的多租户共存和资源共享模式会带来严重的安全隐患. 一方面逻辑上命名空间的软
隔离容易被绕过或突破, 另一方面由于共享宿主机操作系统和底层物理资源容易遭受同驻攻击 …

面向云应用的拟态云服务架构

普黎明, 卫红权, 李星, 江逸茗 - 网络与信息安全学报, 2021 - infocomm-journal.com
针对单执行体的云应用服务缺乏异构性和动态性, 难以应对未知漏洞和后门的安全威胁问题,
提出一种拟态云服务架构, 把云平台向用户提供的应用服务节点构造成基于拟态防御技术的服务 …

容器云中基于Stackelberg 博弈的动态异构调度方法

曾威, 扈红超, 李凌书, 霍树民 - 网络与信息安全学报, 2021 - infocomm-journal.com
容器技术以其灵活, 高效的特性促进了云计算的快速发展, 但同时引入了如同驻攻击,
逃逸攻击和共模攻击等安全威胁. 针对这些安全威胁, 提出一种容器云中基于Stackelberg …