[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …
active security techniques instead of traditional ones to secure the cloud environment based …
Systemic risk and vulnerability analysis of multi-cloud environments
M Reece, TE Lander Jr, M Stoffolano… - arxiv preprint arxiv …, 2023 - arxiv.org
With the increasing use of multi-cloud environments, security professionals face challenges
in configuration, management, and integration due to uneven security capabilities and …
in configuration, management, and integration due to uneven security capabilities and …
GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation
A key challenge associated with Kubernetes configuration files (KCFs) is that they are often
highly complex and error-prone, leading to security vulnerabilities and operational setbacks …
highly complex and error-prone, leading to security vulnerabilities and operational setbacks …
Securing Privacy During a World Health Emergency: Exploring How to Create a Balance Between the Need to Save the World and People's Right to Privacy
Many people describe 2020 as the year the world gave up on privacy. It was the year of the
COVID-19 pandemic when countries all over the world shutdown. It was the year we saw …
COVID-19 pandemic when countries all over the world shutdown. It was the year we saw …
Multi-cloud identity security utilizing
ML Reece - 2024 - search.proquest.com
Sovereign Identity (SSI) is projected to become part of every person's life in some form. The
ability to verify and authenticate that an individual is the actual person they are purported to …
ability to verify and authenticate that an individual is the actual person they are purported to …
Deep Learning Approaches for IoMT
Global population growth might have an impact on how much each country spends on
healthcare. Rapid technological advancement makes it possible that patients can be …
healthcare. Rapid technological advancement makes it possible that patients can be …
Verification of Programs with Concealed Components
S Lahiri - Companion Proceedings of the 2022 ACM SIGPLAN …, 2022 - dl.acm.org
Real-world programs contain a multitude of concealed components whose formal semantics
not available to verification engines, like third-party API calls, inline assembly and SIMD …
not available to verification engines, like third-party API calls, inline assembly and SIMD …
Analysis of Anomaly Detection Techniques Applied to Web API Network Scenario
Z Huang, X Fan, Z Li, C Zhao… - 2023 IEEE 11th Joint …, 2023 - ieeexplore.ieee.org
Web API networks comprise a multitude of API services, and compared to traditional network
environments, they possess unique security requirements and face distinct threats. This …
environments, they possess unique security requirements and face distinct threats. This …
[PDF][PDF] Emerging Trends in Cloud Storage
J Eilts - 2024 - hps.vi4io.org
This report explores the evolving subject of cloud storage by presenting three different
trends: edge computing, sustainability initiatives, and the application of artificial intelligence …
trends: edge computing, sustainability initiatives, and the application of artificial intelligence …
[PDF][PDF] Fortifying the Cloud: A Case Study on Best Practices for Securing Cloud Infrastructure
Cloud infrastructure is the current trend and need of the organization for agile business
continuity and digital transformation. Scalability, remote work enablement, availability, cost …
continuity and digital transformation. Scalability, remote work enablement, availability, cost …