A cognitive deception model for generating fake documents to curb data exfiltration in networks during cyber-attacks

OT Taofeek, M Alawida, A Alabdulatif… - IEEE …, 2022 - ieeexplore.ieee.org
The exponential increase in the compromise of sensitive and intellectual properties alludes
to the huge price the global community must pay for the digital revolution we are currently …

Implications of cyberbiosecurity in advanced agriculture

S Stephen, K Alexander, L Potter, XL Palmer - 2023 - digitalcommons.odu.edu
The world is currently undergoing a rapid digital transformation sometimes referred to as the
fourth industrial revolution. During this transformation, it is increasingly clear that many …

[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.

SS Pericherla - ISC Int. J. Inf. Secur., 2023 - researchgate.net
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …

Supporting security sensitive tenants in a {bare-metal} cloud

A Mosayyebzadeh, A Mohan, S Tikale, M Abdi… - 2019 USENIX Annual …, 2019 - usenix.org
SecCloud is a new architecture for bare-metal clouds that enables tenants to control
tradeoffs between security, price, and performance. It enables security-sensitive tenants to …

Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers

F Erata, C Xu, R Piskac, J Szefer - arXiv preprint arXiv:2401.15869, 2024 - arxiv.org
The interest in quantum computing has grown rapidly in recent years, and with it grows the
importance of securing quantum circuits. A novel type of threat to quantum circuits that …

[PDF][PDF] Towards a Cyber Ontology for Insider Threats in the Financial Sector.

G Kul, SJ Upadhyaya - J. Wirel. Mob. Networks Ubiquitous Comput …, 2015 - researchgate.net
Insider attack has become a major threat in financial sector. Currently, there is no insider
threat ontology in this domain and such an ontology is critical to developing …

Understanding the Perspectives of Information Security Managers on Insider Threat: A Phenomenology Investigation

FA Ngufor - 2020 - search.proquest.com
Insider threat is one of the main issues faced by organizations as information systems
become inherent to the success and competitiveness of businesses in contemporary …

Optimal response to computer network threats

F Abazari, A Madani, H Gharaee - 2016 8th International …, 2016 - ieeexplore.ieee.org
Mitigating security threats is a big challenge for network administrator, because threats can
be exploited by attackers and lead to a cyber-attack. Therefore, network administrator should …

Provisioning Strategies for Centralized Bare-Metal Clusters

A Mohan - 2021 - search.proquest.com
Technological inertia leads many organizations to continue employing static provisioning
strategies for bare-metal deployments, resulting in architectural and runtime inefficiencies …

Mitis-an insider threats mitigation framework for information systems

A Ali, M Ahmed, M Ilyas, J Küng - … Conference, FDSE 2017, Ho Chi Minh …, 2017 - Springer
Cloud computing is now among the most extensively used mean for resource sharing as
SaaS, PaaS, and IaaS. Computing Scenarios have been emerged into cloud computing …