Dynamically organizing cloud computing resources to facilitate discovery

M Srikanth, S Kannan, K Dougan, S Jamieson… - US Patent …, 2019 - Google Patents
Pieces of hardware on which pieces of software are executed are configured to organize
computing resources from different computing resource providers so as to facilitate their …

Cyber-all-intel: An ai for security related threat intelligence

S Mittal, A Joshi, T Finin - arXiv preprint arXiv:1905.02895, 2019 - arxiv.org
Keeping up with threat intelligence is a must for a security analyst today. There is a volume
of information present inthe wild'that affects an organization. We need to develop an artificial …

Preventing poisoning attacks on AI based threat intelligence systems

N Khurana, S Mittal, A Piplai… - 2019 IEEE 29th …, 2019 - ieeexplore.ieee.org
As AI systems become more ubiquitous, securing them becomes an emerging challenge.
Over the years, with the surge in online social media use and the data available for analysis …

Cloud security ontology (CSO)

V Singh, SK Pandey - Cloud Computing for Geospatial Big Data Analytics …, 2019 - Springer
Research study in cloud computing technology reveals the realization of security importance
within its versatile areas. The present security concerns related to issues and challenges …

[PDF][PDF] Security policy modelling in the mobile agent system

H RAZOUKI - International Journal of Computer Network and …, 2019 - mecs-press.org
The mobile agent security problem limits the use of mobile agent technology and hinders its
extensibility and application because the constantly progressed complexity and extension at …

[PDF][PDF] EU General Data Protection Regulation compliance challenges for cloud users

B Duncan - Cloud computing, 2019 - researchgate.net
The EU General Data Protection Regulation (GDPR) has been with us now since the 25th
May 2018. It is certainly the case that in many of the 28 EU countries, regulators were not all …

[PDF][PDF] Cloud compliance risks

B Duncan, Y Zhao - CLOUD COMPUTING 2019, 2019 - researchgate.net
In the current business climate, there is an ever growing need for companies to comply with
a range of legislation, regulation and standards. There is also a need for companies to be …

[图书][B] Knowledge for Cyber Threat Intelligence

S Mittal - 2019 - search.proquest.com
Keeping up with threat intelligence is a must for a security analyst today. There is a volume
of information present in'the wild'that affects an organization. We need to develop an artificial …

Towards Automatic Comparison of Cloud Service Security Certifications

M Labaj, K Rástočný, D Chudá - … Conference on Current Trends in Theory …, 2019 - Springer
Cloud service providers who offer services to their users traditionally signal security of their
offerings through certifications based on various certification schemes. Currently, a vast …

Dynamic Patterns for Cloud Application Life-Cycle Management

G Horn, LOE Arrieta, B Di Martino, P Skrzypek… - … Conference On P2P …, 2019 - Springer
Cloud applications are by nature dynamic and must react to variations in use, and evolve to
adopt new Cloud services, and exploit new capabilities offered by Edge and Fog devices, or …