[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends

MM Belal, DM Sundaram - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …

Systemic risk and vulnerability analysis of multi-cloud environments

M Reece, TE Lander Jr, M Stoffolano… - arxiv preprint arxiv …, 2023 - arxiv.org
With the increasing use of multi-cloud environments, security professionals face challenges
in configuration, management, and integration due to uneven security capabilities and …

GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation

E Malul, Y Meidan, D Mimran, Y Elovici… - arxiv preprint arxiv …, 2024 - arxiv.org
A key challenge associated with Kubernetes configuration files (KCFs) is that they are often
highly complex and error-prone, leading to security vulnerabilities and operational setbacks …

Securing Privacy During a World Health Emergency: Exploring How to Create a Balance Between the Need to Save the World and People's Right to Privacy

S Yu, F Carroll - Data Protection in a Post-Pandemic Society: Laws …, 2023 - Springer
Many people describe 2020 as the year the world gave up on privacy. It was the year of the
COVID-19 pandemic when countries all over the world shutdown. It was the year we saw …

Multi-cloud identity security utilizing

ML Reece - 2024 - search.proquest.com
Sovereign Identity (SSI) is projected to become part of every person's life in some form. The
ability to verify and authenticate that an individual is the actual person they are purported to …

Deep Learning Approaches for IoMT

FF Sahapudeen, T Vigneswari… - Data Modelling and …, 2023 - taylorfrancis.com
Global population growth might have an impact on how much each country spends on
healthcare. Rapid technological advancement makes it possible that patients can be …

Verification of Programs with Concealed Components

S Lahiri - Companion Proceedings of the 2022 ACM SIGPLAN …, 2022 - dl.acm.org
Real-world programs contain a multitude of concealed components whose formal semantics
not available to verification engines, like third-party API calls, inline assembly and SIMD …

Analysis of Anomaly Detection Techniques Applied to Web API Network Scenario

Z Huang, X Fan, Z Li, C Zhao… - 2023 IEEE 11th Joint …, 2023 - ieeexplore.ieee.org
Web API networks comprise a multitude of API services, and compared to traditional network
environments, they possess unique security requirements and face distinct threats. This …

[PDF][PDF] Emerging Trends in Cloud Storage

J Eilts - 2024 - hps.vi4io.org
This report explores the evolving subject of cloud storage by presenting three different
trends: edge computing, sustainability initiatives, and the application of artificial intelligence …

[PDF][PDF] Fortifying the Cloud: A Case Study on Best Practices for Securing Cloud Infrastructure

VP Desai, PP Shinde, KS Oza… - Int. J. Sci. Res. in …, 2023 - researchgate.net
Cloud infrastructure is the current trend and need of the organization for agile business
continuity and digital transformation. Scalability, remote work enablement, availability, cost …