Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
A survey of intrusion detection techniques in cloud
In this paper, we survey different intrusions affecting availability, confidentiality and integrity
of Cloud resources and services. Proposals incorporating Intrusion Detection Systems (IDS) …
of Cloud resources and services. Proposals incorporating Intrusion Detection Systems (IDS) …
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective
Mobile edge computing (MEC) and fog are emerging computing models that extend the
cloud and its services to the edge of the network. The emergence of both MEC and fog …
cloud and its services to the edge of the network. The emergence of both MEC and fog …
An intrusion detection and prevention system in cloud computing: A systematic review
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …
Cloud computing security: A survey
IM Khalil, A Khreishah, M Azeem - Computers, 2014 - mdpi.com
Cloud computing is an emerging technology paradigm that migrates current technological
and computing concepts into utility-like solutions similar to electricity and water systems …
and computing concepts into utility-like solutions similar to electricity and water systems …
Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
Major provisioning of cloud computing is mainly delivered via Software as a Service,
Platform as a Service and Infrastructure as a Service. However, these service delivery …
Platform as a Service and Infrastructure as a Service. However, these service delivery …
A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions
The Internet of Things (IoT) can enable seamless communication between millions of
billions of objects. As IoT applications continue to grow, they face several challenges …
billions of objects. As IoT applications continue to grow, they face several challenges …
[BOOK][B] The state of the art in intrusion prevention and detection
ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …
entities that enter or intrude within the network perimeter, which could commonly be termed …