On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

eHealth cloud security challenges: a survey

Y Al-Issa, MA Ottom, A Tamrawi - Journal of healthcare …, 2019 - Wiley Online Library
Cloud computing is a promising technology that is expected to transform the healthcare
industry. Cloud computing has many benefits like flexibility, cost and energy savings …

5G roadmap: 10 key enabling technologies

IF Akyildiz, S Nie, SC Lin, M Chandrasekaran - Computer Networks, 2016 - Elsevier
The fifth generation (5G) mobile communication networks will require a major paradigm shift
to satisfy the increasing demand for higher data rates, lower network latencies, better energy …

Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms

N Kaaniche, M Laurent - Computer Communications, 2017 - Elsevier
Recent technological advances have sparked the popularity and success of cloud. This new
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …

A security review in the UAVNet era: threats, countermeasures, and gap analysis

A Rugo, CA Ardagna, NE Ioini - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Unmanned Aerial Vehicles (UAVs) are becoming one of the main technological supports for
commercial applications, embracing many domains ranging from human safety to the …

Systematically understanding the cyber attack business: A survey

K Huang, M Siegel, S Madnick - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Cyber attacks are increasingly menacing businesses. Based on the literature review and
publicly available reports, this article conducts an extensive and consistent survey of the …

Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC)

R Kumar, R Goyal - Computers & Security, 2020 - Elsevier
Agile software development methodology and DevOps, together, have helped the business
to achieve agility and velocity in delivering time-to-market applications and services. Open …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds

H Chen, X Zhu, D Qiu, L Liu, Z Du - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the wide deployment of cloud computing in many business enterprises as well as
science and engineering domains, high quality security services are increasingly critical for …

Fededge: Accelerating edge-assisted federated learning

K Wang, Q He, F Chen, H Jin, Y Yang - Proceedings of the ACM Web …, 2023 - dl.acm.org
Federated learning (FL) has been widely acknowledged as a promising solution to training
machine learning (ML) model training with privacy preservation. To reduce the traffic …