Cyber security in iot-based cloud computing: A comprehensive survey

W Ahmad, A Rasool, AR Javed, T Baker, Z Jalil - Electronics, 2021 - mdpi.com
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …

A systematic review on anomaly detection for cloud computing environments

T Hagemann, K Katsarou - Proceedings of the 2020 3rd Artificial …, 2020 - dl.acm.org
The detection of anomalies in data is a far-reaching field of research which also applies to
the field of cloud computing in several different ways: from the detection of various types of …

Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments

T Landman, N Nissim - Neural Networks, 2021 - Elsevier
Since the beginning of the 21st century, the use of cloud computing has increased rapidly,
and it currently plays a significant role among most organizations' information technology …

VMShield: Memory introspection-based malware detection to secure cloud-based services against stealthy attacks

P Mishra, P Aggarwal, A Vidyarthi… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
With the rapid evolution of the industrial Internet, cloud service has emerged as a next-
generation industrial standard that has the potential to revolutionize and transform the …

Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection

Y Zhang, S Luo, L Pan, H Zhang - Future Generation Computer Systems, 2021 - Elsevier
The system call sequence is widely used as raw data due to its prospective performance in
host-based intrusion detection methods using machine learning. However, evolutionary …

MinCloud: Trusted and transferable MinHash-based framework for unknown malware detection for Linux cloud environments

T Panker, A Cohen, T Landman, C Bery… - Journal of Information …, 2024 - Elsevier
Linux clouds have become an attractive target for cyber-attacks. However, existing detection
solutions for Linux clouds have variety of limitations. Some of the solutions are untrusted …

Distappgaurd: Distributed application behaviour profiling in cloud-based environment

M Ghorbani, FF Moghaddam, M Zhang… - Proceedings of the 37th …, 2021 - dl.acm.org
Today, Machine Learning (ML) techniques are increasingly used to detect abnormal
behaviours of industrial applications. Since many of these applications are moving to the …

[引用][C] Security aspects in IoT based cloud computing

E Bazgir, E Haque, NB Sharif… - World Journal …, 2023 - World Journal of Advanced …

Enhancing Security in Cyber-Physical Critical Infrastructures A Focus on Detecting Integrity Attacks through Ensemble Modeling

NM Ghazaly, MA Bhandari - Research Journal of Computer …, 2023 - technicaljournals.org
Improving the safety of cyber-physical key assets is very important to keep their processes
safe from attacks on their stability. In this study, we suggest a new way to find these kinds of …

Behaviour profiling of microservice-based applications and anomaly detection in cloud

M Ghorbani - 2021 - espace.etsmtl.ca
Today, many organizations are moving their applications towards microservice architecture
and virtualized environments because of the benefits such as deployment agility, scalability …