Security and privacy for 6G: A survey on prospective technologies and challenges

VL Nguyen, PC Lin, BC Cheng… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …

Flow based containerized honeypot approach for network traffic analysis: An empirical study

SC Sethuraman, TG Jadapalli, DPV Sudhakaran… - Computer Science …, 2023 - Elsevier
The world of connected devices has been attributed to applications that relied upon
multitude of devices to acquire and distribute data over extremely diverse networks. This …

Intelligent ai-based healthcare cyber security system using multi-source transfer learning method

C Chakraborty, SM Nagarajan, GG Devarajan… - ACM Transactions on …, 2023 - dl.acm.org
Cyber-security intelligence have made a great impact over healthcare industry where
several researchers are developing new techniques to improve security for healthcare …

A Systematic Literature Review on Maintenance of Software Containers

R Malhotra, A Bansal, M Kessentini - ACM Computing Surveys, 2024 - dl.acm.org
Nowadays, cloud computing is gaining tremendous attention to deliver information via the
internet. Virtualization plays a major role in cloud computing as it deploys multiple virtual …

Towards improving container security by preventing runtime escapes

M Reeves, DJ Tian, A Bianchi… - 2021 IEEE Secure …, 2021 - ieeexplore.ieee.org
Container escapes enable the adversary to execute code on the host from inside an isolated
container. These high severity escape vulnerabilities originate from three sources:(1) …

Unsupervised anomaly detection for container cloud via bilstm-based variational auto-encoder

Y Wang, X Chen, Q Wang, R Yang… - ICASSP 2022-2022 …, 2022 - ieeexplore.ieee.org
The appearance of container technology has profoundly changed the development and
deployment of multi-tier distributed applications. However, the imperfect system resource …

DockerWatch: a two-phase hybrid detection of malware using various static features in container cloud

Y Wang, Q Wang, X Qin, X Chen, B Xin, R Yang - Soft Computing, 2023 - Springer
As an emerging virtualization technology, the Linux container provides a more lightweight,
flexible, and high-performance operating-system-level virtual run-time environment. Its …

Who Is Using the Phone? Representation‐Learning‐Based Continuous Authentication on Smartphones

H Wang, H He, C Song, H Tang, Y Sun… - Security and …, 2022 - Wiley Online Library
Recently, mobile technology has become closely linked with our daily activities.
Smartphones are used for multiple personal tasks involving private information, such as …

vtpm-sm: An application scheme of SM2/SM3/SM4 algorithms based on trusted computing in cloud environment

M Zhou, S Ruan, J Liu, X Chen… - 2022 IEEE 15th …, 2022 - ieeexplore.ieee.org
Numbers of applications and businesses are hosted on cloud computing platforms, and it is
essential for cloud tenants to protect their data through encryption or other methods. When …

Enhancing TinyML-Based Container Escape Detectors With Systemcall Semantic Association in UAVs Networks

T Zheng, Y Qiu, Y Zheng, Q Wang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The adoption of lightweight container technology enables the cross-architecture deployment
of tiny machine learning (TinyML) models, while the implementation of container escape …