[PDF][PDF] A Secure Framework for Blockchain Transactions Protection.

WN Al-Sharu, MK Qabalin, M Naser… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
One of the most extensively used technologies for improving the security of IoT devices is
blockchain technology. It is a new technology that can be utilized to boost the security. It is a …

Mitigating cloud computing security risks using a self-monitoring defensive scheme

S Mazur, E Blasch, Y Chen… - Proceedings of the 2011 …, 2011 - ieeexplore.ieee.org
Cloud Computing (CC) promises to offer seamless provisioning of on-demand services and
data through the network. These services are made discoverable to the user in the form of …

A blockchain-enabled incentivised framework for cyber threat intelligence sharing in ics

K Nguyen, S Pal, Z Jadidi, A Dorri… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Industrial Control Systems (ICS) have been targeted increasingly by sophisticated
cyberattacks. Improving ICS security has drawn significant attention in the literature that …

Cyber situation awareness monitoring and proactive response for enterprises on the cloud

H Alavizadeh, H Alavizadeh… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
The cloud model allows many enterprises able to outsource computing resources at an
affordable price without having to commit the expense upfront. Although the cloud providers …

Consortium blockchain-based architecture for cyber-attack signatures and features distribution

O Ajayi, O Igbe, T Saadawi - 2019 IEEE 10th Annual Ubiquitous …, 2019 - ieeexplore.ieee.org
One of the effective ways of detecting malicious traffic in computer networks is intrusion
detection systems (IDS). Though IDS identify malicious activities in a network, it might be …

Blockchain-based bug bounty framework

L Badash, N Tapas, A Nadler, F Longo… - Proceedings of the 36th …, 2021 - dl.acm.org
Bug bounty programs are a popular solution for security researchers to disclose software
vulnerabilities in exchange for compensation. They suffer, however, from two main …

Blockchain-based hierarchical trust networking for JointCloud

H Yang, J Yuan, H Yao, Q Yao, A Yu… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is gradually becoming mature and has already entered our daily
life, which interconnects more machines and makes communication more convenient and …

[HTML][HTML] Trust Management and Resource Optimization in Edge and Fog Computing Using the CyberGuard Framework

AM Alwakeel, AK Alnaim - Sensors, 2024 - mdpi.com
The growing importance of edge and fog computing in the modern IT infrastructure is driven
by the rise of decentralized applications. However, resource allocation within these …

Privacy-preserving and trusted threat intelligence sharing using distributed ledgers

H Ali, P Papadopoulos, J Ahmad… - … on Security of …, 2021 - ieeexplore.ieee.org
Threat information sharing is considered as one of the proactive defensive approaches for
enhancing the over-all security of trusted partners. Trusted partner organizations can …

[PDF][PDF] Cooperative trust framework for cloud computing based on mobile agents

H Toumi, A Talea, B Marzak, A Eddaoui… - International Journal of …, 2015 - researchgate.net
Cloud computing opens doors to the multiple, unlimited venues from elastic computing to on
demand provisioning to dynamic storage, reduce the potential costs through optimized and …