Toward automated security analysis and enforcement for cloud computing using graphical models for security

S An, A Leung, JB Hong, T Eom, JS Park - IEEE Access, 2022 - ieeexplore.ieee.org
Cloud computing has become widely adopted by businesses for hosting applications with
improved performance at a fraction of the operational costs and complexity. The rise of cloud …

Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing

R Patil, H Dudeja, C Modi - International Journal of Information Security, 2020 - Springer
The security of cloud services and underlying resources is a major concern due to
vulnerabilities existing in current implementation of the virtualization. Thus, there is a need of …

Well begun is half done: An empirical study of exploitability & impact of base-image vulnerabilities

MU Haque, MA Babar - 2022 IEEE International Conference on …, 2022 - ieeexplore.ieee.org
Container technology,(eg, Docker) is being widely adopted for deploying software
infrastructures or applications in the form of container images. Security vulnerabilities in the …

Quantifying satisfaction of security requirements of cloud software systems

AM Nhlabatsi, KM Khan, JB Hong… - … on Cloud Computing, 2021 - ieeexplore.ieee.org
The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a
security requirement is either satisfied (true) or not (false). However, a discrete Boolean …

Automated context-aware vulnerability risk management for patch prioritization

V Ahmadi Mehri, P Arlos, E Casalicchio - Electronics, 2022 - mdpi.com
The information-security landscape continuously evolves by discovering new vulnerabilities
daily and sophisticated exploit tools. Vulnerability risk management (VRM) is the most …

Study on the differences in behaviour characteristics of distance online autonomous learning in different network virtual environments

H Wu - … Journal of Continuing Engineering Education and …, 2023 - inderscienceonline.com
Due to the complexity of e-learning mode, the behaviour characteristics of online
autonomous learning are different, and the existing research methods cannot …

Detection of Suspicious Activities at Hypervisor in Cloud Computing: A Brief Study

NSK Anumukonda, RK Yadav - International Conference on Intelligent …, 2023 - Springer
The advent of the Cloud Computing (CC) archetype has brought concerns in security
because resources are distributed and mediated via a Hypervisor that might be aimed by …

[PDF][PDF] A Comprehensive Study on the Dimensions of IaaS Security

M Héder, E Rigó - Journal of Internet Services and Information …, 2024 - eprints.sztaki.hu
In this paper we conduct a systematic exploration of the security considerations of
Infrastructureas-a-Service (IaaS) cloud deployments. These deployments are very common …

Real-Time Malware Prevention and Detection (MP&D) Framework in Cloud Computing Environments

A Agarwal, SB Verma, S Singh - 2024 International Conference …, 2024 - ieeexplore.ieee.org
In the rapidly evolving context of cyberspace, malware is a significant concern, especially for
hypervisors used in cloud computing. To address these issues, this paper outlines new …

[图书][B] Exploring risk-based approach for preventing cyberattacks in the automotive industry

AO Okomanyi - 2022 - search.proquest.com
The purpose of this qualitative descriptive study was to explore how leaders within
automotive original equipment manufacturers (OEMs) describe the use of cybersecurity …