Reputation-based federated learning defense to mitigate threats in eeg signal classification

Z Zhang, P Li, AY Al Hammadi, F Guo… - … on Computer and …, 2024 - ieeexplore.ieee.org
This paper presents a reputation-based threat mitigation framework that defends potential
security threats in electroencephalogram (EEG) signal classification during model …

Threat-specific security risk evaluation in the cloud

A Nhlabatsi, JB Hong, DS Kim… - … on Cloud Computing, 2018 - ieeexplore.ieee.org
Existing security risk evaluation approaches (eg, asset-based) do not consider specific
security requirements of individual cloud computing clients in the security risk evaluation. In …

[HTML][HTML] Robust ML model ensembles via risk-driven anti-clustering of training data

L Mauri, B Apolloni, E Damiani - Information Sciences, 2023 - Elsevier
In this paper, we improve the robustness of Machine Learning (ML) classifiers against
training-time attacks by linking the risk of training data being tampered with to the …

Toward big data risk analysis

E Damiani - 2015 IEEE International Conference on Big Data …, 2015 - ieeexplore.ieee.org
The advent of social networks and Internet-of-Things has resulted in unprecedented
capability of collecting, sharing and analyzing massive amounts of data. From a security …

Assessing the security risks of multicloud saas applications: A real-world case study

O Akinrolabu, S New, A Martin - 2019 6th IEEE international …, 2019 - ieeexplore.ieee.org
Cloud computing is widely believed to be the future of computing. It has grown from being a
promising idea to one of the fastest research and development paradigms of the computing …

Modeling time, probability, and configuration constraints for continuous cloud service certification

M Anisetti, CA Ardagna, E Damiani, N El Ioini… - Computers & …, 2018 - Elsevier
Cloud computing proposes a paradigm shift where resources and services are allocated,
provisioned, and accessed at runtime and on demand. New business opportunities emerge …

Return on investment-based suitability assessment model for cloud migration

AZM Ibrahim, M Hussin - International Journal of Business …, 2025 - inderscienceonline.com
Many IT-based organisations have shown an interest in moving their business operation into
a cloud-enabled system as they noticed that cloud-oriented gives better revenue and return …

Finding risk patterns in cloud system models

F Kunz, ZÁ Mann - 2019 IEEE 12th International Conference on …, 2019 - ieeexplore.ieee.org
The risk of unauthorized access to confidential data is a major problem in cloud computing.
In previous work, the notion of risk patterns was introduced to capture configurations of cloud …

Towards transparent and trustworthy cloud

M Anisetti, CA Ardagna, E Damiani… - IEEE Cloud …, 2017 - ieeexplore.ieee.org
Despite its immense benefits in terms of flexibility, resource consumption, and simplified
management, cloud computing raises several concerns due to lack of trust and …

Spiral^ SRA: a threat-specific security risk assessment framework for the cloud

A Nhlabatsi, JB Hong, DS Kim… - … on Software Quality …, 2018 - ieeexplore.ieee.org
Conventional security risk assessment approaches for cloud infrastructures do not explicitly
consider risk with respect to specific threats. This is a challenge for a cloud provider because …