An investigation on cyber security threats and security models

K Thakur, M Qiu, K Gai, ML Ali - 2015 IEEE 2nd international …, 2015 - ieeexplore.ieee.org
Cyber security has been used interchangeably for information security, where later
considers the role of the human in the security process while former consider this as an …

[HTML][HTML] Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction

K Istiaque Ahmed, M Tahir, M Hadi Habaebi, S Lun Lau… - Sensors, 2021 - mdpi.com
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …

FLOWGUARD: Building robust firewalls for software-defined networks

H Hu, W Han, GJ Ahn, Z Zhao - Proceedings of the third workshop on Hot …, 2014 - dl.acm.org
Software-Defined Networking (SDN) introduces significant granularity, visibility and flexibility
to networking, but at the same time brings forth new security challenges. One of the …

Policy-driven security management for fog computing: Preliminary framework and a case study

C Dsouza, GJ Ahn, M Taguinod - Proceedings of the 2014 IEEE …, 2014 - ieeexplore.ieee.org
With the increasing user demand for elastic provisioning of resources coupled with
ubiquitous and on-demand access to data, cloud computing has been recognized as an …

Flexible and fine-grained mandatory access control on android for diverse security and privacy policies

S Bugiel, S Heuser, AR Sadeghi - 22nd USENIX Security Symposium …, 2013 - usenix.org
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …

Intrusion detection in cyber–physical environment using hybrid Naïve Bayes—Decision table and multi-objective evolutionary feature selection

R Panigrahi, S Borah, M Pramanik, AK Bhoi… - Computer …, 2022 - Elsevier
Researchers are motivated to build effective Intrusion Detection Systems because of the
implications of malicious actions in computing, communication, and cyber–physical systems …

Deep generative learning models for cloud intrusion detection systems

L Vu, QU Nguyen, DN Nguyen… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Intrusion detection (ID) on the cloud environment has received paramount interest over the
last few years. Among the latest approaches, machine learning-based ID methods allow us …

Multiparty access control for online social networks: model and mechanisms

H Hu, GJ Ahn, J Jorgensen - IEEE transactions on knowledge …, 2012 - ieeexplore.ieee.org
Online social networks (OSNs) have experienced tremendous growth in recent years and
become a de facto portal for hundreds of millions of Internet users. These OSNs offer …

Machine learning for anomaly detection and categorization in multi-cloud environments

T Salman, D Bhamare, A Erbad, R Jain… - 2017 IEEE 4th …, 2017 - ieeexplore.ieee.org
Cloud computing has been widely adopted by application service providers (ASPs) and
enterprises to reduce both capital expenditures (CAPEX) and operational expenditures …

[HTML][HTML] A comprehensive review of AI based intrusion detection system

T Sowmya, EAM Anita - Measurement: Sensors, 2023 - Elsevier
In today's digital world, the tremendous amount of data poses a significant challenge to
cyber security. The complexity of cyber-attacks makes it difficult to develop efficient tools to …