[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends

MM Belal, DM Sundaram - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …

Security in Cloud-Native Services: A Survey

T Theodoropoulos, L Rosa, C Benzaid, P Gray… - … of Cybersecurity and …, 2023 - mdpi.com
Cloud-native services face unique cybersecurity challenges due to their distributed
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …

[HTML][HTML] Cyber resilience and cyber security issues of intelligent cloud computing systems

F Abdullayeva - Results in Control and Optimization, 2023 - Elsevier
It is necessary to provide the cyber security of cloud computing according to the components
that constitute its structure. The first step in advancing the cyber security of this technology is …

Detecting and mitigating the dissemination of fake news: Challenges and future research opportunities

W Shahid, B Jamshidi, S Hakak, H Isah… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Fake news is a major threat to democracy (eg, influencing public opinion), and its impact
cannot be understated particularly in our current socially and digitally connected society …

Cybersecurity and privacy in smart bioprinting

JC Isichei, S Khorsandroo, S Desai - Bioprinting, 2023 - Elsevier
Bioprinting is a versatile technology which is gaining rapid adoption in healthcare fields
such as tissue engineering, regenerative medicine, drug delivery, and surgical planning …

A comprehensive survey on cloud computing: architecture, tools, technologies, and open issues

MS Jawed, M Sajid - International Journal of Cloud Applications and …, 2022 - igi-global.com
Cloud computing is one of the most spectacular technological achievements of the 21st
century, allowing users to access various on-demand services (eg, storage, servers …

Extended berkeley packet filter: An application perspective

H Sharaf, I Ahmad, T Dimitriou - IEEE Access, 2022 - ieeexplore.ieee.org
The extended Berkeley Packet Filter (eBPF) is a lightweight and fast 64-bit RISC-like virtual
machine (VM) inside the Linux kernel. eBPF has emerged as the most promising and de …

Evaluating the impact of cloud computing on accounting firms: A review of efficiency, scalability, and data security

A Atadoga, UJ Umoga, OA Lottu… - Global Journal of …, 2024 - gjeta.com
Cloud computing has emerged as a transformative force, revolutionizing the landscape for
accounting firms. This comprehensive review delves into the profound impact of cloud …

Securing Cloud Infrastructure in IaaS and PaaS Environments

AK Nanda, A Sharma, PJ Augustine… - … Security, Privacy, and …, 2024 - igi-global.com
Cloud computing has revolutionized IT infrastructure deployment and management, but it
also presents security and resilience challenges. The study delves into the principles and …

Security Implications of Edge Computing in Cloud Networks

S Ahmadi - Ahmadi, S.(2024) Security Implications of Edge …, 2024 - papers.ssrn.com
Security issues in cloud networks and edge computing have become very common. This
research focuses on analyzing such issues and developing the best solutions. A detailed …