S Stephen, K Alexander, L Potter, XL Palmer - 2023 - digitalcommons.odu.edu
The world is currently undergoing a rapid digital transformation sometimes referred to as the fourth industrial revolution. During this transformation, it is increasingly clear that many …
SS Pericherla - ISC Int. J. Inf. Secur., 2023 - researchgate.net
Cloud computing created a revolution in the way IT organizations and IT teams manage their internal digital resources and workloads. One major drawback or limitation of cloud …
SecCloud is a new architecture for bare-metal clouds that enables tenants to control tradeoffs between security, price, and performance. It enables security-sensitive tenants to …
The interest in quantum computing has grown rapidly in recent years, and with it grows the importance of securing quantum circuits. A novel type of threat to quantum circuits that …
G Kul, SJ Upadhyaya - J. Wirel. Mob. Networks Ubiquitous Comput …, 2015 - researchgate.net
Insider attack has become a major threat in financial sector. Currently, there is no insider threat ontology in this domain and such an ontology is critical to developing …
Insider threat is one of the main issues faced by organizations as information systems become inherent to the success and competitiveness of businesses in contemporary …
Mitigating security threats is a big challenge for network administrator, because threats can be exploited by attackers and lead to a cyber-attack. Therefore, network administrator should …
Technological inertia leads many organizations to continue employing static provisioning strategies for bare-metal deployments, resulting in architectural and runtime inefficiencies …
Cloud computing is now among the most extensively used mean for resource sharing as SaaS, PaaS, and IaaS. Computing Scenarios have been emerged into cloud computing …