Enterprise data breach: causes, challenges, prevention, and future directions
A data breach is the intentional or inadvertent exposure of confidential information to
unauthorized parties. In the digital era, data has become one of the most critical components …
unauthorized parties. In the digital era, data has become one of the most critical components …
Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions
M Mahbub, RM Shubair - Journal of Network and Computer Applications, 2023 - Elsevier
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …
A federated learning system with enhanced feature extraction for human activity recognition
With the rapid growth of mobile devices, wearable sensor-based human activity recognition
(HAR) has become one of the hottest topics in the Internet of Things. However, it is …
(HAR) has become one of the hottest topics in the Internet of Things. However, it is …
[HTML][HTML] A cloud-edge based data security architecture for sharing and analysing cyber threat information
Cyber-attacks affect every aspect of our lives. These attacks have serious consequences,
not only for cyber-security, but also for safety, as the cyber and physical worlds are …
not only for cyber-security, but also for safety, as the cyber and physical worlds are …
An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services
JA Onesimu, J Karthikeyan, Y Sei - Peer-to-Peer Networking and …, 2021 - Springer
The healthcare services industry has seen a huge transformation since the prominent rise of
the Internet of Things (IoT). IoT in healthcare services includes a large number of unified and …
the Internet of Things (IoT). IoT in healthcare services includes a large number of unified and …
Privacy-preserving DDoS attack detection using cross-domain traffic in software defined networks
Existing distributed denial-of-service attack detection in software defined networks (SDNs)
typically perform detection in a single domain. In reality, abnormal traffic usually affects …
typically perform detection in a single domain. In reality, abnormal traffic usually affects …
A review on design inspired subsampling for big data
J Yu, M Ai, Z Ye - Statistical Papers, 2024 - Springer
Subsampling focuses on selecting a subsample that can efficiently sketch the information of
the original data in terms of statistical inference. It provides a powerful tool in big data …
the original data in terms of statistical inference. It provides a powerful tool in big data …
The privacy implications of cyber security systems: A technological survey
Cyber-security systems, which protect networks and computers against cyber attacks, are
becoming common due to increasing threats and government regulation. At the same time …
becoming common due to increasing threats and government regulation. At the same time …
Less is more: Supporting developers in vulnerability detection during code review
Reviewing source code from a security perspective has proven to be a difficult task. Indeed,
previous research has shown that developers often miss even popular and easy-to-detect …
previous research has shown that developers often miss even popular and easy-to-detect …
A holistic view on data protection for sharing, communicating, and computing environments: Taxonomy and future directions
The data is an important asset of an organization and it is essential to keep this asset
secure. It requires security in whatever state is it ie data at rest, data in use, and data in …
secure. It requires security in whatever state is it ie data at rest, data in use, and data in …