The number of Internet of Things (IoT) devices has increased considerably in the past few years, which resulted in an exponential growth of cyber attacks on IoT infrastructure. As a …
K Lee, J Lee, K Yim - Applied Sciences, 2023 - mdpi.com
According to the Fire-eye's M-Trends Annual Threat Report 2022, there are many advanced persistent threat (APT) attacks that are currently in use, and such continuous and specialized …
DB Rawat, R Doku, M Garuba - IEEE Transactions on Services …, 2019 - ieeexplore.ieee.org
''Knowledge is power” is an old adage that has been found to be true in today's information age. Knowledge is derived from having access to information. The ability to gather …
A Ponmalar, V Dhanakoti - Applied Soft Computing, 2022 - Elsevier
The mainstream computing technology is not efficient in managing massive data and detecting network traffic intrusions, often including big data. The intrusions present in …
U Narayanan, V Paul, S Joseph - … of King Saud University-Computer and …, 2022 - Elsevier
With the rapid growth of data sources, Big data security in Cloud is a big challenge. Different issues have ascended in the area of Big data security such as infrastructure security, data …
Cloud virtualization technology, ingrained with physical resource sharing, prompts cybersecurity threats on users' virtual machines (VMs) due to the presence of inevitable …
The inefficient sharing of industrial cloud resour-ces among multiple users and vulnerabilities of virtual machines (VM) s and servers prompt unauthorized access to users' …
D Saxena, AK Singh - Electronics Letters, 2020 - Wiley Online Library
Cloud clients face high security risks while sharing physical resources with multiple users. A malicious cloud user exploits co‐residency and hypervisor vulnerabilities to steal and …
Although there are numerous advantages of the IoT in industrial use, there are also some security problems, such as insecure supply chains or vulnerabilities. These lead to a …