Enterprise data breach: causes, challenges, prevention, and future directions

L Cheng, F Liu, D Yao - Wiley Interdisciplinary Reviews: Data …, 2017 - Wiley Online Library
A data breach is the intentional or inadvertent exposure of confidential information to
unauthorized parties. In the digital era, data has become one of the most critical components …

A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures

A Yazdinejad, B Zolfaghari, A Azmoodeh… - Applied Sciences, 2021 - mdpi.com
In recent years, Smart Farming (SF) and Precision Agriculture (PA) have attracted attention
from both the agriculture industry as well as the research community. Altogether, SF and PA …

A taxonomy of blockchain-enabled softwarization for secure UAV network

A Kumari, R Gupta, S Tanwar, N Kumar - Computer Communications, 2020 - Elsevier
The recent advancements in unmanned aerial vehicles (UAVs) upsurges its usages in
commercial and civilian applications such as surveillance, rescue, and crowdsensing. UAVs …

Data exfiltration: A review of external attack vectors and countermeasures

F Ullah, M Edwards, R Ramdhany, R Chitchyan… - Journal of Network and …, 2018 - Elsevier
Context One of the main targets of cyber-attacks is data exfiltration, which is the leakage of
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …

NFV security survey: From use case driven threat analysis to state-of-the-art countermeasures

M Pattaranantakul, R He, Q Song… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Network functions virtualization (NFV), along with software-defined networking (SDN), drives
a new change in networking infrastructure with respect to designing, deploying, and …

Evolution of attacks, threat models, and solutions for virtualized systems

D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …

Securing docker containers from denial of service (dos) attacks

J Chelladhurai, PR Chelliah… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
The concept of containerization and virtualization is getting traction in the cloud based IT
environments. Docker engine is popular implementation for simplifying and streamlining …

Securing graph neural networks in mlaas: A comprehensive realization of query-based integrity verification

B Wu, X Yuan, S Wang, Q Li, M Xue… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The deployment of Graph Neural Networks (GNNs) within Machine Learning as a Service
(MLaaS) has opened up new attack surfaces and an escalation in security concerns …

LibSEAL: Revealing service integrity violations using trusted execution

PL Aublin, F Kelbert, D O'Keeffe… - Proceedings of the …, 2018 - dl.acm.org
Users of online services such as messaging, code hosting and collaborative document
editing expect the services to uphold the integrity of their data. Despite providers' best efforts …

Offering security diagnosis as a service for cloud SaaS applications

M Elsayed, M Zulkernine - Journal of information security and applications, 2019 - Elsevier
With the maturity of service-oriented architecture (SOA), microservices architecture, and Web
technologies, web services have become critical components of Software as a Service …