Enterprise data breach: causes, challenges, prevention, and future directions
A data breach is the intentional or inadvertent exposure of confidential information to
unauthorized parties. In the digital era, data has become one of the most critical components …
unauthorized parties. In the digital era, data has become one of the most critical components …
A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures
In recent years, Smart Farming (SF) and Precision Agriculture (PA) have attracted attention
from both the agriculture industry as well as the research community. Altogether, SF and PA …
from both the agriculture industry as well as the research community. Altogether, SF and PA …
A taxonomy of blockchain-enabled softwarization for secure UAV network
The recent advancements in unmanned aerial vehicles (UAVs) upsurges its usages in
commercial and civilian applications such as surveillance, rescue, and crowdsensing. UAVs …
commercial and civilian applications such as surveillance, rescue, and crowdsensing. UAVs …
Data exfiltration: A review of external attack vectors and countermeasures
Context One of the main targets of cyber-attacks is data exfiltration, which is the leakage of
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …
NFV security survey: From use case driven threat analysis to state-of-the-art countermeasures
Network functions virtualization (NFV), along with software-defined networking (SDN), drives
a new change in networking infrastructure with respect to designing, deploying, and …
a new change in networking infrastructure with respect to designing, deploying, and …
Evolution of attacks, threat models, and solutions for virtualized systems
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …
and resources. Even if the benefits in terms of performance, maintenance, and cost are …
Securing docker containers from denial of service (dos) attacks
J Chelladhurai, PR Chelliah… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
The concept of containerization and virtualization is getting traction in the cloud based IT
environments. Docker engine is popular implementation for simplifying and streamlining …
environments. Docker engine is popular implementation for simplifying and streamlining …
Securing graph neural networks in mlaas: A comprehensive realization of query-based integrity verification
The deployment of Graph Neural Networks (GNNs) within Machine Learning as a Service
(MLaaS) has opened up new attack surfaces and an escalation in security concerns …
(MLaaS) has opened up new attack surfaces and an escalation in security concerns …
LibSEAL: Revealing service integrity violations using trusted execution
Users of online services such as messaging, code hosting and collaborative document
editing expect the services to uphold the integrity of their data. Despite providers' best efforts …
editing expect the services to uphold the integrity of their data. Despite providers' best efforts …
Offering security diagnosis as a service for cloud SaaS applications
With the maturity of service-oriented architecture (SOA), microservices architecture, and Web
technologies, web services have become critical components of Software as a Service …
technologies, web services have become critical components of Software as a Service …