Systematic literature review (SLR) on social media and the digital transformation of drug trafficking on darkweb

R Rawat, V Mahor, M Chouhan, K Pachlasiya… - … Conference on Network …, 2022 - Springer
A proposed study provides an annotated list of SLR (Systematic literature Review) for use by
dark web (DW) researchers, cyber experts, and security agencies in the investigation and …

[PDF][PDF] Data integrity attacks in cloud computing: A review of identifying and protecting techniques

DVS Kaja, Y Fatima, AB Mailewa - J. homepage www. ijrpr. com …, 2022 - researchgate.net
Cloud computing is growing tremendously in recent years. Many organizations are switching
their traditional computing model to a cloud based because of its low cost and pay-as-you …

Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities

AM Dissanayaka, S Mengel, L Gittner, H Khan - Cluster Computing, 2020 - Springer
It is essential to ensure the data security of data analytical frameworks as any security
vulnerability existing in the system can lead to a data loss or data breach. This vulnerability …

Vulnerability prioritization, root cause analysis, and mitigation of secure data analytic framework implemented with mongodb on singularity linux containers

AM Dissanayaka, S Mengel, L Gittner… - Proceedings of the 2020 …, 2020 - dl.acm.org
A Vulnerability Management system is a disciplined, programmatic approach to discover
and mitigate vulnerabilities in a system. While securing systems from data exploitation and …

[HTML][HTML] Mechanisms and techniques to enhance the security of big data analytic framework with mongodb and Linux containers

A Mailewa, S Mengel, L Gittner, H Khan - Array, 2022 - Elsevier
The frequency and scale of unauthorized access cases and misuses of data access
privileges are a growing concern of many organizations. The protection of confidential data …

Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best Practices

MMA Khan, EN Ehabe… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The use of software to support the information infrastructure that governments, critical
infrastructure providers and businesses worldwide rely on for their daily operations and …

A Blockchain-based Intrusion Detection/Prevention Systems in IoT Network: A Systematic Review

K Shalabi, QA Al-Haija, M Al-Fayoumi - Procedia Computer Science, 2024 - Elsevier
Abstract The Internet of Things (IoT) is an innovative technology used in manufacturing,
environmental monitoring, home automation, human health applications, and other fields …

Robust Efficiency Evaluation of NextCloud and GoogleCloud

N Singh, K Bui, A Mailewa - Advances in Technology, 2021 - journals.sjp.ac.lk
Cloud storage services such as GoogleCloud and NextCloud have become increasingly
popular among Internet users and businesses. Despite the many encrypted file cloud …

Analyzing Data Encryption Efficiencies for Secure Cloud Storages: A Case Study of Pcloud vs OneDrive vs Dropbox

S Gamnis, M VanderLinden, A Mailewa - Advances in Technology, 2022 - journals.sjp.ac.lk
Now more than ever has it become important to keep the information confidential in an age
that is losing its value of individual privacy. In this cloud computing era, regardless of the …

[PDF][PDF] How dark web monitoring can be used for osint and investigations

A Alquwayzani, R Aldossri, MH Rahman - Journal of Theoretical and …, 2023 - jatit.org
The dark web is a hidden network of websites that cannot be accessed through regular
search engines or browsers. It is often associated with illegal activities, such as the sale of …