Toward automated security analysis and enforcement for cloud computing using graphical models for security
S An, A Leung, JB Hong, T Eom, JS Park - IEEE Access, 2022 - ieeexplore.ieee.org
Cloud computing has become widely adopted by businesses for hosting applications with
improved performance at a fraction of the operational costs and complexity. The rise of cloud …
improved performance at a fraction of the operational costs and complexity. The rise of cloud …
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing
The security of cloud services and underlying resources is a major concern due to
vulnerabilities existing in current implementation of the virtualization. Thus, there is a need of …
vulnerabilities existing in current implementation of the virtualization. Thus, there is a need of …
Well begun is half done: An empirical study of exploitability & impact of base-image vulnerabilities
Container technology,(eg, Docker) is being widely adopted for deploying software
infrastructures or applications in the form of container images. Security vulnerabilities in the …
infrastructures or applications in the form of container images. Security vulnerabilities in the …
Quantifying satisfaction of security requirements of cloud software systems
The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a
security requirement is either satisfied (true) or not (false). However, a discrete Boolean …
security requirement is either satisfied (true) or not (false). However, a discrete Boolean …
Automated context-aware vulnerability risk management for patch prioritization
The information-security landscape continuously evolves by discovering new vulnerabilities
daily and sophisticated exploit tools. Vulnerability risk management (VRM) is the most …
daily and sophisticated exploit tools. Vulnerability risk management (VRM) is the most …
Study on the differences in behaviour characteristics of distance online autonomous learning in different network virtual environments
H Wu - … Journal of Continuing Engineering Education and …, 2023 - inderscienceonline.com
Due to the complexity of e-learning mode, the behaviour characteristics of online
autonomous learning are different, and the existing research methods cannot …
autonomous learning are different, and the existing research methods cannot …
Detection of Suspicious Activities at Hypervisor in Cloud Computing: A Brief Study
NSK Anumukonda, RK Yadav - International Conference on Intelligent …, 2023 - Springer
The advent of the Cloud Computing (CC) archetype has brought concerns in security
because resources are distributed and mediated via a Hypervisor that might be aimed by …
because resources are distributed and mediated via a Hypervisor that might be aimed by …
[PDF][PDF] A Comprehensive Study on the Dimensions of IaaS Security
In this paper we conduct a systematic exploration of the security considerations of
Infrastructureas-a-Service (IaaS) cloud deployments. These deployments are very common …
Infrastructureas-a-Service (IaaS) cloud deployments. These deployments are very common …
Real-Time Malware Prevention and Detection (MP&D) Framework in Cloud Computing Environments
A Agarwal, SB Verma, S Singh - 2024 International Conference …, 2024 - ieeexplore.ieee.org
In the rapidly evolving context of cyberspace, malware is a significant concern, especially for
hypervisors used in cloud computing. To address these issues, this paper outlines new …
hypervisors used in cloud computing. To address these issues, this paper outlines new …
[图书][B] Exploring risk-based approach for preventing cyberattacks in the automotive industry
AO Okomanyi - 2022 - search.proquest.com
The purpose of this qualitative descriptive study was to explore how leaders within
automotive original equipment manufacturers (OEMs) describe the use of cybersecurity …
automotive original equipment manufacturers (OEMs) describe the use of cybersecurity …