On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

[HTML][HTML] A stacking ensemble of deep learning models for IoT intrusion detection

R Lazzarini, H Tianfield, V Charissis - Knowledge-Based Systems, 2023 - Elsevier
The number of Internet of Things (IoT) devices has increased considerably in the past few
years, which resulted in an exponential growth of cyber attacks on IoT infrastructure. As a …

Classification and analysis of malicious code detection techniques based on the APT attack

K Lee, J Lee, K Yim - Applied Sciences, 2023 - mdpi.com
According to the Fire-eye's M-Trends Annual Threat Report 2022, there are many advanced
persistent threat (APT) attacks that are currently in use, and such continuous and specialized …

Cybersecurity in big data era: From securing big data to data-driven security

DB Rawat, R Doku, M Garuba - IEEE Transactions on Services …, 2019 - ieeexplore.ieee.org
''Knowledge is power” is an old adage that has been found to be true in today's information
age. Knowledge is derived from having access to information. The ability to gather …

An intrusion detection approach using ensemble support vector machine based chaos game optimization algorithm in big data platform

A Ponmalar, V Dhanakoti - Applied Soft Computing, 2022 - Elsevier
The mainstream computing technology is not efficient in managing massive data and
detecting network traffic intrusions, often including big data. The intrusions present in …

[HTML][HTML] A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment

U Narayanan, V Paul, S Joseph - … of King Saud University-Computer and …, 2022 - Elsevier
With the rapid growth of data sources, Big data security in Cloud is a big challenge. Different
issues have ascended in the area of Big data security such as infrastructure security, data …

An AI-driven VM threat prediction model for multi-risks analysis-based cloud cybersecurity

D Saxena, I Gupta, R Gupta, AK Singh… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud virtualization technology, ingrained with physical resource sharing, prompts
cybersecurity threats on users' virtual machines (VMs) due to the presence of inevitable …

Emerging vm threat prediction and dynamic workload estimation for secure resource management in industrial clouds

D Saxena, R Gupta, AK Singh… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The inefficient sharing of industrial cloud resour-ces among multiple users and
vulnerabilities of virtual machines (VM) s and servers prompt unauthorized access to users' …

Security embedded dynamic resource allocation model for cloud data centre

D Saxena, AK Singh - Electronics Letters, 2020 - Wiley Online Library
Cloud clients face high security risks while sharing physical resources with multiple users. A
malicious cloud user exploits co‐residency and hypervisor vulnerabilities to steal and …

Digital-twin-based security analytics for the internet of things

P Empl, G Pernul - Information, 2023 - mdpi.com
Although there are numerous advantages of the IoT in industrial use, there are also some
security problems, such as insecure supply chains or vulnerabilities. These lead to a …