Digital industrial control systems: Vulnerabilities and security technologies

IA Adeyanju, ED Emake, OM Olaniyan… - … Applied Science and …, 2021 - li01.tci-thaijo.org
Abstract Digital Industrial Control Systems (ICS) are complex electromechanical systems
composed of components such as sensors, actuators, programmable logic controllers and …

Onion encrypted multilevel security framework for public cloud

P Roy, R Kumar - 2022 2nd International Conference on Power …, 2022 - ieeexplore.ieee.org
Cloud computing has evolved as a renowned technology in the twenty-first century for
delivering data service requirements at a low cost, with minimal effort, and with a high level …

A Hybrid Security Framework to Preserve Multilevel Security on Public Cloud Networks

P Roy, R Kumar - … on System Modeling & Advancement in …, 2021 - ieeexplore.ieee.org
Cloud computing uses the “pay as you go model” to provide on-demand services to its
users, especially data storage, computing power, network, and others. In recent years, Cloud …

Multilevel Security Framework based on An Onion Encryption in Public Cloud Network

P Roy, R Kumar - … 3rd International Conference on Advances in …, 2021 - ieeexplore.ieee.org
Cloud computing has evolved as a well-known technology in the twenty-first century for
delivering data service requirements at a low cost, with minimal effort, and with a high level …

An Approach of Modified IDEA with 1024 Bits Key to Enhance Security and Efficiency of Data Transmission in the Healthcare Sector

B Haldar, PK Mukherjee… - International Journal of …, 2024 - search.proquest.com
Securing the information from the attackers is a crucial aspect of modern digital life.
Numerous cryptographic algorithms are employed to provide security for data transmission …

Effective Systems for Insider Threat Detection

MQJ AlSlaiman - 2023 - corescholar.libraries.wright.edu
Insider threats to information security have become a burden for organizations.
Understanding insider activities leads to an effective improvement in identifying insider …

A Simulation Modeling for the Effect of Resource Consumption Attack over Mobile Ad Hoc Network

R Alsaqour, M Abdelhaq, N Alghamdi… - … Journal of Computer …, 2023 - koreascience.kr
Abstract Mobile Ad-hoc Network (MANET) is an infrastructure-less network that can
configure itself without any centralized management. The topology of MANET changes …

[PDF][PDF] Multilevel Cloud Security Policy (MCSP) for Cloud-Based Environments

P Oberoi, S Mittal, RK Gujral - International Journal of Innovative …, 2019 - researchgate.net
In the present period Cloud computing (CC) generally addresses the issues of quick
arrangement and on-request versatility. Despite the fact that Cloud computing gives …