Fog computing security: a review of current applications and security solutions

S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …

A comparative study on cyber threat intelligence: The security incident response perspective

D Schlette, M Caselli, G Pernul - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) is threat information intended for security purposes.
However, use for incident response demands standardization. This study examines the …

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service

S Iqbal, MLM Kiah, B Dhaghighi, M Hussain… - Journal of Network and …, 2016 - Elsevier
Major provisioning of cloud computing is mainly delivered via Software as a Service,
Platform as a Service and Infrastructure as a Service. However, these service delivery …

A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - IEEE …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

How integration of cyber security management and incident response enables organizational learning

A Ahmad, KC Desouza, SB Maynard… - Journal of the …, 2020 - Wiley Online Library
Digital assets of organizations are under constant threat from a wide assortment of nefarious
actors. When threats materialize, the consequences can be significant. Most large …

Performance comparison of heuristic algorithms for task scheduling in IaaS cloud computing environment

SHH Madni, MS Abd Latiff, M Abdullahi… - PloS one, 2017 - journals.plos.org
Cloud computing infrastructure is suitable for meeting computational needs of large task
sizes. Optimal scheduling of tasks in cloud computing environment has been proved to be …

Forensic-by-design framework for cyber-physical cloud systems

NH Ab Rahman, WB Glisson, Y Yang… - IEEE Cloud …, 2016 - ieeexplore.ieee.org
As businesses continue to offer customers and employees increased access, improved
software functionality, and continued improvements in supply chain management …

A security authorization scheme for smart home Internet of Things devices

BC Chifor, I Bica, VV Patriciu, F Pop - Future Generation Computer Systems, 2018 - Elsevier
Abstract The Internet of Things (IoT) is becoming an important factor in many areas of our
society. IoT brings intelligence to critical aspects like transportation, industry, payments …

Design of a provably secure biometrics-based multi-cloud-server authentication scheme

S Kumari, X Li, F Wu, AK Das, KKR Choo… - Future Generation …, 2017 - Elsevier
Abstract Big Data and Cloud of Things (CoT) are two inter-related research trends in our
data-driven society, and one research challenge is to design efficient security solution that …