Digital twin: A comprehensive survey of security threats

C Alcaraz, J Lopez - IEEE Communications Surveys & Tutorials, 2022‏ - ieeexplore.ieee.org
Industry 4.0 is having an increasingly positive impact on the value chain by modernizing and
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …

A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities

D Levshun, I Kotenko - Artificial Intelligence Review, 2023‏ - Springer
Abstract Information systems need to process a large amount of event monitoring data. The
process of finding the relationships between events is called correlation, which creates a …

[HTML][HTML] Secure cloud infrastructure: A survey on issues, current solutions, and open challenges

Y Alghofaili, A Albattah, N Alrajeh, MA Rassam… - Applied Sciences, 2021‏ - mdpi.com
Cloud computing is currently becoming a well-known buzzword in which business titans,
such as Microsoft, Amazon, and Google, among others, are at the forefront in develo** …

Modeling and detection of the multi-stages of advanced persistent threats attacks based on semi-supervised learning and complex networks characteristics

A Zimba, H Chen, Z Wang, M Chishimba - Future Generation Computer …, 2020‏ - Elsevier
Abstract Advanced Persistent Threats (APT) present the most sophisticated types of attacks
to modern networks which have proved to be very challenging to address. Using …

[HTML][HTML] Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework

T Jabar, M Mahinderjit Singh - Sensors, 2022‏ - mdpi.com
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …

An evaluation framework for industrial control system cyber incidents

MD Firoozjaei, N Mahmoudyar, Y Baseri… - International Journal of …, 2022‏ - Elsevier
Industrial control systems (ICSs) and critical infrastructure are targeted by sophisticated
cyber incidents launched by skillful and persistent attackers. Due to political, public image …

[HTML][HTML] Advanced persistent threat attack detection method in cloud computing based on autoencoder and softmax regression algorithm

FJ Abdullayeva - Array, 2021‏ - Elsevier
Abstract APT (Advanced Persistent Threat) is a complex type of attack that steals personal
data by staying in the infected system for a long time. When APT attacks take place in a …

Load balancing and server consolidation in cloud computing environments: a meta-study

M Ala'Anzy, M Othman - IEEE Access, 2019‏ - ieeexplore.ieee.org
The data-center is considered the heart of cloud computing. Recently, the growing demand
for cloud computing services has caused a growing load on data centers. In terms of system …

Security issues and defensive approaches in deep learning frameworks

H Chen, Y Zhang, Y Cao, J **e - Tsinghua Science and …, 2021‏ - ieeexplore.ieee.org
Deep learning frameworks promote the development of artificial intelligence and
demonstrate considerable potential in numerous applications. However, the security issues …

APT-Dt-KC: advanced persistent threat detection based on kill-chain model

M Panahnejad, M Mirabi - The Journal of Supercomputing, 2022‏ - Springer
Advanced persistent threat attacks are considered as a serious risk to almost any
infrastructure since attackers are constantly changing and evolving their advanced …