DMAIDPS: A distributed multi-agent intrusion detection and prevention system for cloud IoT environments

A Javadpour, P Pinto, F Ja'fari, W Zhang - Cluster Computing, 2023‏ - Springer
Abstract Cloud Internet of Things (CIoT) environments, as the essential basis for computing
services, have been subject to abuses and cyber threats. The adversaries constantly search …

Autonomic cloud computing based management and security solutions: State‐of‐the‐art, challenges, and opportunities

N Agrawal - Transactions on Emerging Telecommunications …, 2021‏ - Wiley Online Library
The advancements and rapid adoption of service oriented architecture, utility computing,
virtualization, etc., have emerged in a new computing paradigm called cloud computing, in …

Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection

G Sreelatha, AV Babu, D Midhunchakkaravarthy - Cluster computing, 2022‏ - Springer
Cloud computing (CC) offers various types of services for the users and it is also termed on-
demand computing. Because of its increasing popularity, it is vulnerable to a variety of …

Sok: Autonomic cybersecurity-securing future disruptive technologies

C Rouff, L Watkins, R Sterritt… - 2021 IEEE International …, 2021‏ - ieeexplore.ieee.org
This paper is a systemization of knowledge of autonomic cybersecurity. Disruptive
technologies, such as IoT, AI and autonomous systems, are becoming more prevalent and …

[PDF][PDF] COOPERATIVE TRUST FRAMEWORK BASED ON HY-IDS, FIREWALLS, AND MOBILE AGENTS TO ENHANCE SECURITY IN A CLOUD ENVIRONMENT

H TOUMI, FZ FAGROUD, K ACHTAICH… - Journal of Theoretical …, 2023‏ - jatit.org
Cloud computing has indeed become a popular method for hosting and delivering internet-
based services due to its efficiency and scalability. However, as with any technology, there …

An analytical review and analysis for the data control and security in cloud computing

M Samvatsar, P Kanungo - International Journal of Advanced …, 2020‏ - search.proquest.com
In this paper an analytical review and analysis for the data control and security in cloud
computing was presented and analysed. This review and analysis covers three aspects …

Embedded virtualization computing platform security architecture based on trusted computing

Z Shuang, W **nyu, K Deqi… - 2020 7th International …, 2020‏ - ieeexplore.ieee.org
With the application of virtualization and multi-core processor in embedded system, the
computing capacity of embedded system has been improved comprehensively, but it is also …

Towards an Advanced Integrated Security Framework for Cloud Computing

ZP Gariba, JA van der Poll - … of Sixth International Congress on Information …, 2021‏ - Springer
Cloud computing (CC) has become a technological change enabling amongst other small
and medium enterprises (SMEs) in obtaining access to emerging ICTs at lower costs. The …

An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm

NP Ponnuviji, MV Prem - … on Internet and Information Systems (TIIS …, 2021‏ - koreascience.kr
Cloud Computing has emerged as an extensively used technology not only in the IT sector
but almost in all sectors. As the nature of the cloud is distributed and dynamic, the jeopardies …

An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls

MI Hussain, J He, N Zhu, Z Ali Zardari… - Journal of Intelligent …, 2021‏ - content.iospress.com
Cloud computing on-demand dynamicity in nature of end-user that leads towards a hybrid
cloud model deployment is called a multi-cloud. Multi-cloud is a multi-tenant and multi …