Provisioning trust-oriented role-based access control for maintaining data integrity in cloud

UR Saxena, T Alam - … Journal of System Assurance Engineering and …, 2023 - Springer
Cloud computing platforms have been one of the best sources for resource computation and
service recommendations in the recent years. Users' reliance on the cloud has increased …

Predicting Data Exfiltration using Supervised Machine Learning based on Tactics Map** from Threat Reports and Event Logs

AR Hakim, K Ramli, M Salman, B Pranggono… - IEEE …, 2024 - ieeexplore.ieee.org
Data breach attacks are unique, especially when attackers exfiltrate data from their target's
systems. Furthermore, as data breaches continue to increase in frequency and severity, they …

Digital forensics architecture for real-time automated evidence collection and centralization: Leveraging security lake and modern data architecture

WS Ahmed, ZT Mustafa AL-Ta'I, T Abegaz… - Journal of Intelligent …, 2024 - degruyter.com
In the face of escalating cyber threats, a real-time automated security evidence collection
system for cloud-based digital forensics investigations is essential for identifying and …

Data Breaches: Financial and Reputational Impacts of Vulnerabilities on Organizations to Enhance Cybersecurity Strategies

A Gite, A Joshi, J Agrawal, T Agarwal… - 2024 3rd …, 2024 - ieeexplore.ieee.org
In the current digital era, organizations and businesses face increasing vulnerability to
cybersecurity threats, with data breaches presenting substantial risks to their operational …

Exploration of the Gap Between the Secure Web Application Development Competencies Needed by Industry and Those Competencies Provided by Graduates of US …

GA Harris - 2024 - search.proquest.com
Literature demonstrates that threats and attacks on computer systems and networks have
been around since the beginning of computing, and the number, severity, sophistication …

Duck Blind: Remote Host-Based Forensics of Universal Serial Bus Attack Platforms

MA Alexander - 2024 - search.proquest.com
Significant attacks have been conducted against governments and the private sector from
Insider Threats (InTs) using Universal Serial Bus (USB) devices, such as the STUXNET …

Analisis Digital Forensik Kasus Pelanggaran Data Pada Media Sosial Whatsapp dengan Framework D4I (Studi Kasus: CekResi SiCepat Express. apk)

AZ Nasuhah - 2025 - eprints.umm.ac.id
Tingginya penggunaan media sosial di Indonesia, khususnya WhatsApp, meningkatkan
risiko kejahatan siber seperti penipuan berbasis rekayasa sosial. Penelitian ini …

[PDF][PDF] Enhancing Data Security in Knowledge Databases: A Novel Integration of Fast Huffman Encoding and Encryption Techniques

B Kumari, NK Kamal, AM Sattar, MK Ranjan, R Jain - technoaretepublication.org
In today's rapidly changing technological environment, it is critical to protect knowledge
databases, which are vast and elaborate. Conventional security techniques sometimes fail …

제로트러스트 도입을 위한 SDP 기술 동향

M Kim, S Lee, J Park - Review of KIISC, 2024 - koreascience.kr
제로트러스트는 전세계적으로 사이버 보안의 패러다임 변화를 가져오고 있다. 이러한 환경에서
세부화 된 워크로드 별로 안전하게 접속하기 위한 방법으로 SDP 가 적용되거나 SDP 기술을 …