Cyber security in iot-based cloud computing: A comprehensive survey

W Ahmad, A Rasool, AR Javed, T Baker, Z Jalil - Electronics, 2021 - mdpi.com
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …

Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

A survey on security challenges in cloud computing: issues, threats, and solutions

H Tabrizchi, M Kuchaki Rafsanjani - The journal of supercomputing, 2020 - Springer
Cloud computing has gained huge attention over the past decades because of continuously
increasing demands. There are several advantages to organizations moving toward cloud …

Security and privacy challenges in mobile cloud computing: Survey and way ahead

MB Mollah, MAK Azad, A Vasilakos - Journal of Network and Computer …, 2017 - Elsevier
The rapid growth of mobile computing is seriously challenged by the resource constrained
mobile devices. However, the growth of mobile computing can be enhanced by integrating …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions

T Senevirathna, VH La, S Marchal… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
With the advent of 5G commercialization, the need for more reliable, faster, and intelligent
telecommunication systems is envisaged for the next generation beyond 5G (B5G) radio …

Security of open radio access networks

D Mimran, R Bitton, Y Kfir, E Klevansky, O Brodt… - Computers & …, 2022 - Elsevier
Abstract The Open Radio Access Network (O-RAN) is a promising radio access network
(RAN) architecture aimed at reshaping the RAN industry toward an open, adaptive, and …

Cyberattacks and security of cloud computing: a complete guideline

M Dawood, S Tu, C Xiao, H Alasmary, M Waqas… - Symmetry, 2023 - mdpi.com
Cloud computing is an innovative technique that offers shared resources for stock cache and
server management. Cloud computing saves time and monitoring costs for any organization …

Cyber threat modeling: Survey, assessment, and representative framework

DJ Bodeau, CD McCollum, DB Fox - Mitre Corp, Mclean, 2018 - apps.dtic.mil
This report provides a survey of cyber threat modeling frameworks, presents a comparative
assessment of the surveyed frameworks, and extends an existing framework to serve as a …

Systematic identification of threats in the cloud: A survey

JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais… - Computer Networks, 2019 - Elsevier
When a vulnerability is discovered in a system, some key questions often asked by the
security analyst are what threat (s) does it pose, what attacks may exploit it, and which parts …