ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detection tool or what Internet of Things Search Engines know about you

A Daskevics, A Nikiforova - 2021 second international …, 2021 - ieeexplore.ieee.org
The paper proposes a tool for non-intrusive testing of open data sources for detecting their
vulnerabilities, called ShoBeVODSDT (Shodan-and Binary Edge-based vulnerable open …

IoTSE-based open database vulnerability inspection in three Baltic countries: ShoBEVODSDT sees you

A Daskevics, A Nikiforova - 2021 8th International Conference …, 2021 - ieeexplore.ieee.org
This study aims to analyze the state of the security of open data databases, ie being
accessible from the outside of organization, representing both relational databases and …

[PDF][PDF] Dynamic & portable vulnerability assessment testbed with Linux containers to ensure the security of MongoDB in Singularity LXCs

AM Dissanayaka, S Mengel, L Gittner… - … Conference of the …, 2018 - researchgate.net
It is essential to ensure the data security of data analytical frameworks as any security
vulnerability existing in the system can lead to a data loss or data breach. This vulnerability …

Database security threats and challenges

A Mousa, M Karabatak, T Mustafa - 2020 8th International …, 2020 - ieeexplore.ieee.org
With the growth and increasing sophistication of the Internet and the increasing
dependence, it appeared more and more services over the Internet-based database, so it …

NoSQL security: can my data-driven decision-making be influenced from outside?

A Nikiforova, A Daskevics, O Azeroual - … and Uses in the Public and …, 2023 - emerald.com
Nowadays, there are billions interconnected devices forming Cyber-Physical Systems
(CPS), Internet of Things (IoT) and Industrial Internet of Things (IIoT) ecosystems. With an …

Vulnerability prioritization, root cause analysis, and mitigation of secure data analytic framework implemented with mongodb on singularity linux containers

AM Dissanayaka, S Mengel, L Gittner… - Proceedings of the 2020 …, 2020 - dl.acm.org
A Vulnerability Management system is a disciplined, programmatic approach to discover
and mitigate vulnerabilities in a system. While securing systems from data exploitation and …

Privacy violating opensource intelligence threat evaluation framework: a security assessment framework for critical infrastructure owners

A Cartagena, G Rimmer, T van Dalsen… - 2020 10th Annual …, 2020 - ieeexplore.ieee.org
Open Source Intelligence (OSINT) is the process of using tools and information to passively
learn enough information about an organization to begin the cyber attack cycle. OSINT …

Big data Analytics of cyber attacks: a review

MV Suraj, NK Singh, DS Tomar - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
Cyber crime over big data is expand with unprecedented rate that badly affects the Internet
industry and the global data. Progressively sophisticated attack and offensive methods used …

Securing big data in the age of AI

M Kantarcioglu, F Shaon - … on Trust, Privacy and Security in …, 2019 - ieeexplore.ieee.org
Increasingly organizations are collecting ever larger amounts of data to build complex data
analytics, machine learning and AI models. Furthermore, the data needed for building such …

Big data security and privacy: Current challenges and future research perspective in cloud environment

S Riaz, AH Khan, M Haroon, S Latif… - 2020 International …, 2020 - ieeexplore.ieee.org
Cloud computing is an Internet-based technology that emerging rapidly in the last few years
due to popular and demanded services required by various institutions, organizations, and …