Security threats, countermeasures, and challenges of digital supply chains

B Hammi, S Zeadally, J Nebhen - ACM Computing Surveys, 2023 - dl.acm.org
The rapid growth of Information Communication Technologies (ICT) has impacted many
fields. In this context, the supply chain has also quickly evolved toward the digital supply …

Survey on smart homes: Vulnerabilities, risks, and countermeasures

B Hammi, S Zeadally, R Khatoun, J Nebhen - Computers & Security, 2022 - Elsevier
Over the last few years, the explosive growth of Internet of Things (IoT) has revolutionized
the way we live and interact with each other as well as with various types of systems and …

Cloud security: Emerging threats and current solutions

L Coppolino, S D'Antonio, G Mazzeo… - Computers & Electrical …, 2017 - Elsevier
Many organizations are stuck in the cloudify or not to cloudify limbo, mainly due to concerns
related to the security of enterprise sensitive data. Removing this barrier is a key pre …

DDoS detection system: Using a set of classification algorithms controlled by fuzzy logic system in apache spark

A Alsirhani, S Sampalli… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks are a major security threat against the
availability of conventional or cloud computing resources. Numerous DDoS attacks, which …

[HTML][HTML] Cyber-storms come from clouds: Security of cloud computing in the IoT era

M De Donno, A Giaretta, N Dragoni, A Bucchiarone… - Future Internet, 2019 - mdpi.com
The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is
connected to the Internet, making computing pervasive like never before. This tsunami of …

An iterative mathematical decision model for cloud migration: A cost and security risk approach

M Hosseini Shirvani, AM Rahmani… - Software: Practice and …, 2018 - Wiley Online Library
This paper presents an iterative mathematical decision model for organizations to evaluate
whether to invest in establishing information technology (IT) infrastructure on‐premises or …

DDoS attack detection system: utilizing classification algorithms with Apache Spark

A Alsirhani, S Sampalli… - 2018 9th IFIP international …, 2018 - ieeexplore.ieee.org
Cloud computing is a model of configurable computing resources such as servers, networks,
storages, applications, and services that are available from anywhere at any time. In …

Hiding in plain sight: An empirical study of web application abuse in malware

M Yao, J Fuller, RP Kasturi, S Agarwal… - 32nd USENIX Security …, 2023 - usenix.org
Web applications provide a wide array of utilities that are abused by malware as a
replacement for traditional attacker-controlled servers. Thwarting these Web App-Engaged …

A reputation system for detection of black hole attack in vehicular networking

R Khatoun, P Gut, R Doulami, L Khoukhi… - … on Cyber Security of …, 2015 - ieeexplore.ieee.org
In recent years, vehicular networks has drawn special attention as it has significant potential
to play an important role in future smart city to improve the traffic efficiency and guarantee …

DDoS attack detection approach using an efficient cluster analysis in large data scale

W Bhaya, M EbadyManaa - … on New Trends in Information & …, 2017 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attack is a congestion-based attack that makes both
the network and host-based resources unavailable for legitimate users, sending flooding …