A survey on intrusion detection systems for fog and cloud computing

V Chang, L Golightly, P Modesti, QA Xu, LMT Doan… - Future Internet, 2022 - mdpi.com
The rapid advancement of internet technologies has dramatically increased the number of
connected devices. This has created a huge attack surface that requires the deployment of …

Adoption of cloud computing as innovation in the organization

L Golightly, V Chang, QA Xu, X Gao… - International Journal of …, 2022 - journals.sagepub.com
Over the years, there has been a heavy reliance on cloud computing as IT has innovated
through time. In recent times cloud computing has grown monumentally. Many organizations …

Analysing role of businesses' investment in digital literacy: A case of Pakistan

E Irfan, Y Ali, M Sabir - Technological Forecasting and Social Change, 2022 - Elsevier
The digital economy in Pakistan holds abundant potential, yet its existence is far from
commonplace for ordinary Pakistani citizens. Understanding and implementing strategies to …

Cybersecurity vulnerabilities and solutions in Ethiopian university websites

AY Eshetu, EA Mohammed, AO Salau - Journal of Big Data, 2024 - Springer
This study investigates the causes and countermeasures of cybercrime vulnerabilities,
specifically focusing on selected 16 Ethiopian university websites. This study uses a …

Cyber Security approaches in e-Learning

M Anghel, GC Pereteanu - INTED2020 Proceedings, 2020 - library.iated.org
Along with the advent of the “e-” revolution that began in the 2000s, came the issue of cyber
security, cyber-attacks and cyber threats concerning domains included, but not limited to e …

A Study of XXE Attacks Prevention Using XML Parser Configuration

R Shahid, SNK Marwat, A Al-Fuqaha… - 2022 14th …, 2022 - ieeexplore.ieee.org
Online attacks are outcomes of cyber vulnerabilities. XML (eXtensible Markup Language) is
a self-descriptive markup language, and XML eXternal Entity injection (XXE) is a well …

Leveraging the MITRE ATT&CK Framework to Enhance Organizations Cyberthreat Detection Procedures

CJ Chukwu - 2023 - repository.library.carleton.ca
In today's rapidly evolving digital landscape, cyber threat groups continually adapt their
attack strategies, presenting a significant challenge for organizations striving to protect their …

Loss and premium calculation of network nodes under the spread of SIS virus

J Qi - Journal of Intelligent & Fuzzy Systems, 2023 - content.iospress.com
In the big data and “Internet+” era, the research related cybersecurity risk has attracted much
attention. However, Premium pricing for cybersecurity insurance remains in its early days. In …

Pose orientation analysis for fall detection using non-invasive technologies

RA Duţescu, M Apostol - 2023 24th International Conference on …, 2023 - ieeexplore.ieee.org
Older adults are more susceptible to falling which can cause serious health problems due to
their frail bodies, dizziness, and other common health problems common for this age group …

[PDF][PDF] Data Security Approach in Remote Healthcare Monitoring

D NICOLAU, O BICA, L BĂJENARU - Romanian Cyber Security …, 2023 - researchgate.net
In the context of an increased need to develop home care systems such as health
monitoring systems, this paper presents an innovative system, namely Ro-SmartAgeing …