CADS-ML/DL: efficient cloud-based multi-attack detection system

S Farhat, M Abdelkader, A Meddeb-Makhlouf… - International Journal of …, 2023 - Springer
With the increasing adoption of cloud computing, securing cloud-based systems and
applications has become a critical concern for almost every organization. Traditional security …

Cloud computing security via intelligent intrusion detection mechanisms

H Nasir, A Ayaz, S Nizamani, S Siraj… - … Journal of Information …, 2024 - journals.cfrit.com
New challenges of data breaches, unauthorized access, and insider threats have emerged
with the rise of Cloud Computing. Attackers find cloud systems attractive due to their …

A predictive model for risk and trust assessment in cloud computing: taxonomy and analysis for attack pattern detection

A Chrysikos, S McGuire - Guide to Vulnerability Analysis for Computer …, 2018 - Springer
Cloud computing environments consist of many entities that have different roles, such as
provider and customer, and multiple interactions amongst them. Trust is an essential …

HIDCC: A hybrid intrusion detection approach in cloud computing

MA Hatef, V Shaker, MR Jabbarpour… - Concurrency and …, 2018 - Wiley Online Library
The rapid growth of distributed computing systems that heavily communicate and interact
with each other has raised the importance of confrontation against cyber intruders, attackers …

A feasible approach to intrusion detection in virtual network layer of Cloud computing

C Modi, D Patel - Sādhanā, 2018 - Springer
Intrusion detection/prevention is the greatest security challenge at virtual network layer of
Cloud computing. To address this challenge, there have been several security frameworks …

A survey of security issues for cloud computing

MA Khan - Journal of network and computer applications, 2016 - Elsevier
High quality computing services with reduced cost and improved performance have made
cloud computing a popular paradigm. Due to its flexible infrastructure, net centric approach …

Adaptive security management in saas applications

M Almorsy, A Ibrahim, J Grundy - Security, Privacy and Trust in Cloud …, 2013 - Springer
Adaptive Security Management in SaaS Applications | SpringerLink Skip to main content
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your research …

Security in cloud computing: threats, mitigation strategies, and future directions

N Khalifa, W Elmedany - 2023 - IET
The providers of cloud services offer organization and businesses flexible, scalable IT
services with reasonable costs. These advantages in building an entire infrastructure on the …

Detecting and Preventing Unauthorized User Access to Cloud Services by CASBs

AR Reddy, KL Flower, J Anitha… - … on Electronics and …, 2023 - ieeexplore.ieee.org
It is possible for businesses to protect their cloud-based data using the ease and integration
offered by Cloud Access Security Brokers (CASBs). This article explains about the ways to …

Threat-specific security risk evaluation in the cloud

A Nhlabatsi, JB Hong, DS Kim… - … on Cloud Computing, 2018 - ieeexplore.ieee.org
Existing security risk evaluation approaches (eg, asset-based) do not consider specific
security requirements of individual cloud computing clients in the security risk evaluation. In …