Big data in cybersecurity: a survey of applications and future trends

MM Alani - Journal of Reliable Intelligent Environments, 2021 - Springer
With over 4.57 billion people using the Internet in 2020, the amount of data being generated
has exceeded 2.5 quintillion bytes per day. This rapid increase in the generation of data has …

NFV security survey in 5G networks: A three-dimensional threat taxonomy

T Madi, HA Alameddine, M Pourzandi, A Boukhtouta - Computer Networks, 2021 - Elsevier
Fifth Generation (5G) networks aim at providing value-added services with advanced
performance such as low-latency communications, high reliability, high data rates and …

A survey of practical formal methods for security

T Kulik, B Dongol, PG Larsen, HD Macedo… - Formal aspects of …, 2022 - dl.acm.org
In today's world, critical infrastructure is often controlled by computing systems. This
introduces new risks for cyber attacks, which can compromise the security and disrupt the …

Strategizing secured image storing and efficient image retrieval through a new cloud framework

J Noor, SI Salim, ABMA Al Islam - Journal of Network and Computer …, 2021 - Elsevier
Nowadays, a major problem in faster page loading through optimizing websites is the
absence of having images in their intended sizes. Accordingly, while loading a webpage …

Performance enhancement of cloud security with migration algorithm for choosing virtual machines in cloud computing

R Manivannan, S Senthilkumar… - Engineering …, 2024 - iopscience.iop.org
The management of the hardware as well as software resources entrusted to third-party
service suppliers have shown to be extraordinarily remarkable and accessible with Cloud …

Cross-VM network channel attacks and countermeasures within cloud computing environments

A Saeed, P Garraghan… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cloud providers attempt to maintain the highest levels of isolation between Virtual Machines
(VMs) and inter-user processes to keep co-located VMs and processes separate. This …

Modeling NFV deployment to identify the cross-level inconsistency vulnerabilities

SL Thirunavukkarasu, M Zhang… - … on Cloud Computing …, 2019 - ieeexplore.ieee.org
By providing network functions through software running on standard hardware, Network
Functions Virtualization (NFV) brings many benefits, such as increased agility and flexibility …

Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)

S Lakshmanan, M Zhang, S Majumdar… - … on Dependable and …, 2023 - ieeexplore.ieee.org
As one of the main technology pillars of 5 G networks, Network Functions Virtualization
(NFV) enables agile and cost-effective deployment of network services. However, the multi …

[PDF][PDF] Modelling the HUBCAP sandbox architecture in VDM: A study in security

T Kulik, HD Macedo, P Talasila, PG Larsen - John Fitzgerald, Tomohiro …, 2021 - arxiv.org
In this paper, we report on the work in progress towards the security analysis of a cloud
based collaboration platform proposing a novel sandboxing concept. To overcome the …

Cross-Level Security Verification for Network Functions Virtualization (NFV)

A Oqaily, ME Kabir, L Wang, Y Jarraya… - … on Dependable and …, 2025 - ieeexplore.ieee.org
Network Functions Virtualization (NFV) is a popular solution for providing multi-tenant
network services on top of existing cloud infrastructures in an agile and cost-effective …