[PDF][PDF] Real-time threat prediction for cloud based assets using big-data analytics

TK Thriveni, CSR Prashanth - 2015 - researchgate.net
With reports on cloud related breaches becoming a daily occurrence, enterprises are
looking for secure cloud infrastructure which can support their applications and data on …

AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES

TC Kanth - 2024 - philpapers.org
Cloud computing has become an essential component of enterprises and organizations
globally in the current era of digital technology. The cloud has a multitude of advantages …

Predictive analytics-based cybersecurity framework for cloud infrastructure

A Bhardwaj, K Kaushik - International Journal of Cloud Applications …, 2022 - igi-global.com
The most valuable asset for any organization and individual is data and the information it
holds. This is the main reason for Information Security to be the top concern in boardrooms …

Optimizing Incident Response in Cloud Security with Ai And Big Data Integration

AK ReddyAyyadapu - Chelonian Research Foundation, 2023 - acgpublishing.com
This study investigates how to combine big data analytics and artificial intelligence (AI) to
optimize incident response in cloud security. Strong security measures are becoming …

A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing

MT Khorshed, ABMS Ali, SA Wasimi - Future Generation computer systems, 2012 - Elsevier
The long-term potential benefits through reduction of cost of services and improvement of
business outcomes make Cloud Computing an attractive proposition these days. To make it …

Enhancing cloud security—proactive threat monitoring and detection using a siem-based approach

E Tuyishime, TC Balan, PA Cotfas, DT Cotfas… - Applied Sciences, 2023 - mdpi.com
With the escalating frequency of cybersecurity threats in public cloud computing
environments, there is a pressing need for robust security measures to safeguard sensitive …

Navigating the Landscape of Security Threat Analysis in Cloud Computing environments

V Singh, VD Kaushik - Security and Risk Analysis for Intelligent …, 2024 - taylorfrancis.com
Currently, major activities of a country involve financial, social, business as well as
legislative connections—at all scales, including individuals, governmental as well as …

Threat modeling in cloud computing-a literature review

M Kharma, A Taweel - International Conference on Ubiquitous Security, 2022 - Springer
Cloud computing has significantly changed the operational models of companies. This
adoption has consequently caused impact on security, resulting in a wider attack surface …

[PDF][PDF] Challenges Cybersecurity Architects Are Facing In A Cloud Computing Environment

A Allen, E Puchaty, B Zoghi - International Journal of Computer …, 2021 - academia.edu
In the past decade, cloud computing has become an integral part of many companies'
business strategies and IT architecture. Companies look to seek and adopt new business …

Data-driven threat analysis for ensuring security in cloud enabled systems

MKS Alwaheidi, S Islam - Sensors, 2022 - mdpi.com
Cloud computing offers many benefits including business flexibility, scalability and cost
savings but despite these benefits, there exist threats that require adequate attention for …