Results 31 to 40 of about 2,849,694 (325)

Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review

open access: yesIEEE Access, 2020
Cloud computing gained much popularity in the recent past due to its many internet-based services related to data, application, operating system, and eliminating the need for central hardware access. Many of the challenges associated with cloud computing
M. Ahsan   +5 more
semanticscholar   +1 more source

Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach

open access: yesApplied Sciences, 2023
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime   +4 more
doaj   +1 more source

A Transformer-based network intrusion detection approach for cloud security

open access: yesJ. Cloud Comput.
The distributed architecture of cloud computing necessitates robust defense mechanisms to secure network-accessible resources against a diverse and dynamic threat landscape. A Network Intrusion Detection System (NIDS) is pivotal in this context, with its
Zhenyue Long   +5 more
semanticscholar   +1 more source

Security of Zero Trust Networks in Cloud Computing: A Comparative Review

open access: yesSustainability, 2022
Recently, networks have shifted from traditional in-house servers to third-party-managed cloud platforms due to its cost-effectiveness and increased accessibility toward its management.
Sirshak Sarkar   +4 more
semanticscholar   +1 more source

DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments [PDF]

open access: yes, 2011
With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption,
Joshi, JBD, Takabi, H, Zargar, ST
core   +2 more sources

Data security and privacy in the cloud [PDF]

open access: yesMobile Multimedia/Image Processing, Security, and Applications 2019, 2019
Relying on the cloud for storing data and performing computations has become a popular solution in today’s society, which demands large data collections and/or analysis over them to be readily available, for example, to make knowledge-based decisions.
S. De Capitani di Vimercati   +3 more
openaire   +1 more source

AI-Driven Cloud Security: Examining the Impact of User Behavior Analysis on Threat Detection

open access: yesAsian Journal of Research in Computer Science
This study explores the comparative effectiveness of AI-driven user behavior analysis and traditional security measures in cloud computing environments.
S. Olabanji   +5 more
semanticscholar   +1 more source

Securing the Data in Clouds with Hyperelliptic Curve Cryptography

open access: yes, 2014
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay   +3 more
core   +1 more source

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture

open access: yesIEEE Access
In the rapidly evolving realm of the Industrial Internet of Things (IIoT), securing shop floor operations, especially in audit processes, is of critical importance.
Fatemeh Stodt   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy