The Impact of AI on Secure Cloud Computing: Opportunities and Challenges

R Jones - The Indonesian Journal of Computer Science, 2024 - ijcs.net
This paper explores the intersection of Artificial Intelligence (AI) and cloud computing,
focusing on the security implications. As cloud computing becomes increasingly ubiquitous …

Security threats and recent countermeasures in cloud computing

A Mishra, N Gupta, BB Gupta - Modern principles, practices, and …, 2020 - igi-global.com
The cloud is an appealing innovation that has driven, in record time, an extraordinary
interest. It is right now one of the busiest regions of research in IT, due to its adaptability …

Decision Trees Unleashed: Simplifying IoT Malware Detection With Advanced AI Techniques

D Mohammed, M Omar - Innovations, Securities, and Case Studies …, 2024 - igi-global.com
This chapter presents an in-depth study on the application of decision tree-based classifiers
for the detection of malware in internet of things (IoT) environments. With the burgeoning …

Enhancing IoT Security: Leveraging Advanced Deep Learning Architectures for Proactive Botnet Detection and Network Resilience

RK Jones - Redefining Security With Cyber AI, 2024 - igi-global.com
This chapter explores the application of advanced deep learning architectures, namely
convolutional neural networks (CNNs) and recurrent neural networks (RNNs), for the …

Comparative analysis of threat modeling methods for cloud computing towards healthcare security practice

P Yeng, SD Wolthusen, B Yang - 2020 - ntnuopen.ntnu.no
Healthcare organizations consist of unique activities including collaborating on patients care
and emergency care. The sector also accumulates high sensitive multifaceted patients' data …

[PDF][PDF] Identifying the top threats in cloud computing and its suggested solutions: a survey

NA Kofahi, AR Al-Rabadi - Networks, 2018 - researchgate.net
The interest in cloud computing has increased rapidly in the last two decades. This
increased interest is attributed to the important role played by cloud computing in the various …

[PDF][PDF] Malware authorship attribution: Unmasking the culprits behind malicious software

LB Albtosh - World Journal of Advanced Research and Reviews, 2024 - wjarr.co.in
With the digital age ushering in an unprecedented proliferation of malware, accurately
attributing these malicious software variants to their original authors or affiliated groups has …

The role of cloud services in malicious software: Trends and insights

X Han, N Kheir, D Balzarotti - Detection of Intrusions and Malware, and …, 2015 - Springer
In this paper we investigate the way cyber-criminals abuse public cloud services to host part
of their malicious infrastructures, including exploit servers to distribute malware, C&C …

[PDF][PDF] Cloud Computing–Threats and Challenges

I Ahmad, H Bakht, U Mohan - J. Comput. Manag. Stud, 2017 - academia.edu
Recent advances in cloud technologies have gained much eminence in successfully
delivering computing services, but yet to receive much needed attention to offer …

Investigating the Limitations of Adversarial Training for Language Models in Realistic Spam Filter Deployment Scenarios

L Albtosh - Redefining Security With Cyber AI, 2024 - igi-global.com
Adversarial training has emerged as the prevailing approach for fortifying natural language
processing (NLP) models against adversarial attacks, bolstering their accuracy and overall …