In this survey, we review the existing game-theoretic approaches for cyber security and privacy issues, categorizing their application into two classes, security and privacy. To show …
E Furuncu, I Sogukpinar - Computer Standards & Interfaces, 2015 - Elsevier
Cloud computing is one of the most popular information processing concepts of today's IT world. The security of the cloud computing is complicated because each service model uses …
Today, many products and solutions are provided on the cloud; however, the amount and financial losses due to cloud security incidents illustrate the critical need to do more to …
L Maghrabi, E Pfluegel, SF Noorji - … International Conference On …, 2016 - ieeexplore.ieee.org
In recent years, cloud computing has emerged as a key computing paradigm because of its ubiquitous, convenient and scalable on-demand access to a shared pool of computing …
F Anwar, BUII Khan, RF Olanrewaju… - … Journal of Electrical …, 2020 - section.iaesonline.com
The progressively ubiquitous connectivity in the present information systems pose newer challenges tosecurity. The conventional security mechanisms have come a long way in …
Cloud computing has become a widely applied technology in the industry. Broad network access as a characteristic of cloud computing brings business value. It poses threats to …
Cloud Computing is a new evolutionary and dynamic platform that makes use of virtualization technology. In Cloud computing environment, virtualization abstracts the …
Cloud Computing has been adopted by many leading organizations for storage, processing, sharing and to provide other services. It faces several security challenges from its …
SR Etesami, T Başar - Dynamic Games and Applications, 2019 - Springer
Due to complex dependencies between multiple layers and components of emerging cyber- physical systems, security and vulnerability of such systems have become a major challenge …