The adoption of cloud computing has become increasingly widespread across various domains. However, the inherent security vulnerabilities of cloud computing pose significant …
Abstract The Internet of Things (IoT) enabled technology will be adopted to develop smart cities, electronic commerce, electronic learning, electronic health, and other aspects of …
V Ravindranath, S Ramasamy… - 2020 IEEE congress …, 2020 - ieeexplore.ieee.org
Network intrusion and cyber attacks are the most severe concern for Cloud computing service providers. The vulnerability of attacks is on a hike that manual or simple rule-based …
Applications of internet-of-things (IoT) are increasingly being used in many facets of our daily life, which results in an enormous volume of data. Cloud computing and fog computing …
Intrusion detection systems (IDS) play a crucial role in securing networks and identifying malicious activity. This is a critical problem in cyber security. In recent years, metaheuristic …
In recent years, the high improvement in communication, Internet of Things (IoT) and cloud computing have begun complex questioning in security. Based on the development …
Cloud computing is a preferred option for organizations around the globe, it offers scalable and internet-based computing resources as a flexible service. Security is a key concern …
Cloud computing security is the most critical factor for providers, cloud users, and organizations. The various novel approaches apply host‐based or network‐based methods …
One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, wherein the network traffic performance is unpredictable …