A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions

O Alkadi, N Moustafa, B Turnbull - IEEE Access, 2020 - ieeexplore.ieee.org
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …

Current security threats in the national and international context

LM Cristea - Journal of accounting and management information …, 2020 - ceeol.com
Research Question: What are the main security threats emphasized by national and
international surveys? Motivation: The rapid growth of IT brings worldwide security issues …

Conceptual characterization of cybersecurity ontologies

BF Martins, L Serrano, JF Reyes, JI Panach… - … Working Conference on …, 2020 - Springer
Cybersecurity is known as the practice of protecting systems from digital attacks.
Organizations are seeking efficient solutions for the management and protection of their …

[PDF][PDF] Ontology-based context-sensitive software security knowledge management modeling

M Alenezi - International Journal of Electrical and Computer …, 2020 - malenezi.github.io
The disconcerting increase in the number of security attacks on software calls for an
imminent need for including secure development practices within the software development …

[PDF][PDF] Cybersecurity Ontologies: A Systematic Literature Review

WFB Rivadeneira, OS Gómez - ReCIBE. Revista electrónica de …, 2020 - redalyc.org
Cybersecurity is a young discipline that has gained relevance in our modern society. This
research reports the findings of a systematic review of the literature on ontologies in the field …

Cyber security in cloud platforms

SD Mishra, BK Dewangan… - Information Security and …, 2020 - taylorfrancis.com
Cloud storage and applications are accessed through the internet. With developments in
wireless communication technologies like the Third Generation Partnership Project Long …

Hypergraph-based type theory for software development in a Cyber-Physical context

N Christen - Advances in Ubiquitous Computing, 2020 - Elsevier
This chapter will explore the integration of several methodologies related to source code
analysis and Requirements Engineering in a software development context. The chapter will …

[PDF][PDF] A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

B TURNBULL - academia.edu
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …

[PDF][PDF] Conceptual Characterization of Cybersecurity Ontologies

O Pastor, B Rochwerger - uv.es
Cybersecurity is known as the practice of protecting systems from digital attacks.
Organizations are seeking efficient solutions for the management and protection of their …

Development of an Information Security Management Model for Enterprise Automated Systems

T Alhussain, AA AlZubi, O AlFarraj, S Alkhalaf… - … : Proceedings of the 34th …, 2020 - Springer
This article proposes an information security management system (ISMS) model for
automated data processing systems of critical applications (ADPS-CAs). The model allows …