[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends
MM Belal, DM Sundaram - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …
active security techniques instead of traditional ones to secure the cloud environment based …
Security in Cloud-Native Services: A Survey
T Theodoropoulos, L Rosa, C Benzaid, P Gray… - … of Cybersecurity and …, 2023 - mdpi.com
Cloud-native services face unique cybersecurity challenges due to their distributed
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …
[HTML][HTML] Cyber resilience and cyber security issues of intelligent cloud computing systems
F Abdullayeva - Results in Control and Optimization, 2023 - Elsevier
It is necessary to provide the cyber security of cloud computing according to the components
that constitute its structure. The first step in advancing the cyber security of this technology is …
that constitute its structure. The first step in advancing the cyber security of this technology is …
Detecting and mitigating the dissemination of fake news: Challenges and future research opportunities
Fake news is a major threat to democracy (eg, influencing public opinion), and its impact
cannot be understated particularly in our current socially and digitally connected society …
cannot be understated particularly in our current socially and digitally connected society …
Cybersecurity and privacy in smart bioprinting
JC Isichei, S Khorsandroo, S Desai - Bioprinting, 2023 - Elsevier
Bioprinting is a versatile technology which is gaining rapid adoption in healthcare fields
such as tissue engineering, regenerative medicine, drug delivery, and surgical planning …
such as tissue engineering, regenerative medicine, drug delivery, and surgical planning …
A comprehensive survey on cloud computing: architecture, tools, technologies, and open issues
Cloud computing is one of the most spectacular technological achievements of the 21st
century, allowing users to access various on-demand services (eg, storage, servers …
century, allowing users to access various on-demand services (eg, storage, servers …
Extended berkeley packet filter: An application perspective
H Sharaf, I Ahmad, T Dimitriou - IEEE Access, 2022 - ieeexplore.ieee.org
The extended Berkeley Packet Filter (eBPF) is a lightweight and fast 64-bit RISC-like virtual
machine (VM) inside the Linux kernel. eBPF has emerged as the most promising and de …
machine (VM) inside the Linux kernel. eBPF has emerged as the most promising and de …
Securing Cloud Infrastructure in IaaS and PaaS Environments
AK Nanda, A Sharma, PJ Augustine… - … Security, Privacy, and …, 2024 - igi-global.com
Cloud computing has revolutionized IT infrastructure deployment and management, but it
also presents security and resilience challenges. The study delves into the principles and …
also presents security and resilience challenges. The study delves into the principles and …
Security Implications of Edge Computing in Cloud Networks
S Ahmadi - Ahmadi, S.(2024) Security Implications of Edge …, 2024 - papers.ssrn.com
Security issues in cloud networks and edge computing have become very common. This
research focuses on analyzing such issues and develo** the best solutions. A detailed …
research focuses on analyzing such issues and develo** the best solutions. A detailed …
[PDF][PDF] Phishing attack, its detections and prevention techniques
The relentless surge of cyber threats represents a pressing challenge to global security and
individual privacy. Among these, phishing attacks remain a particularly pernicious form of …
individual privacy. Among these, phishing attacks remain a particularly pernicious form of …