[HTML][HTML] An efficient and secure big data storage in cloud environment by using triple data encryption standard

MN Ramachandra, M Srinivasa Rao, WC Lai… - Big Data and Cognitive …, 2022 - mdpi.com
In recent decades, big data analysis has become the most important research topic. Hence,
big data security offers Cloud application security and monitoring to host highly sensitive …

Security of open radio access networks

D Mimran, R Bitton, Y Kfir, E Klevansky, O Brodt… - Computers & …, 2022 - Elsevier
Abstract The Open Radio Access Network (O-RAN) is a promising radio access network
(RAN) architecture aimed at resha** the RAN industry toward an open, adaptive, and …

Systematic literature review on security misconfigurations in web applications

SL Martins, FM Cruz, RP Araújo… - International Journal of …, 2024 - Taylor & Francis
Security misconfigurations are unintentional errors that can lead to vulnerabilities in
applications, compromising an organization's safety. This article aims to provide a …

No keys to the kingdom required: a comprehensive investigation of missing authentication vulnerabilities in the wild

M Karl, M Musch, G Ma, M Johns, S Lekies - Proceedings of the 22nd …, 2022 - dl.acm.org
Nowadays, applications expose administrative endpoints to the Web that can be used for a
plethora of security sensitive actions. Typical use cases range from running small snippets of …

Data security as a top priority in the digital world: preserve data value by being proactive and thinking security first

A Nikiforova - The International Research & Innovation Forum, 2022 - Springer
Today, large amounts of data are being continuously produced, collected, and exchanged
between systems. As the number of devices, systems and data produced grows up, the risk …

Out of sight, out of mind: Detecting orphaned web pages at internet-scale

S Pletinckx, K Borgolte, T Fiebig - … of the 2021 ACM SIGSAC Conference …, 2021 - dl.acm.org
Security misconfigurations and neglected updates commonly lead to systems being
vulnerable. Especially in the context of websites, we often find pages that were forgotten …

NoSQL security: can my data-driven decision-making be influenced from outside?

A Nikiforova, A Daskevics, O Azeroual - … and Uses in the Public and …, 2023 - emerald.com
Nowadays, there are billions interconnected devices forming Cyber-Physical Systems
(CPS), Internet of Things (IoT) and Industrial Internet of Things (IIoT) ecosystems. With an …

[PDF][PDF] NoSQL security: can my data-driven decision-making be affected from outside?

A Nikiforova, A Daskevics, O Azeroual - Big Data & Decision-Making …, 2022 - academia.edu
Nowadays, there are billions interconnected devices forming Cyber-Physical Systems,
Internet of Things (IoT) and Industrial Internet of Things (IIoT) ecosystems. With an …

Emerging Cyber Risks & Threats in Healthcare Systems: A Case Study in Resilient Cybersecurity Solutions

A Abdi, H Bennouri, A Keane - 2024 13th Mediterranean …, 2024 - ieeexplore.ieee.org
The exponential growth of digitalisation in healthcare and the ongoing threat of
cybersecurity breaches are significant and cast a shadow over the industry's progress. As …