SDN security review: Threat taxonomy, implications, and open challenges

M Rahouti, K Xiong, Y Xin… - IEEE …, 2022 - ieeexplore.ieee.org
Software-Defined networking (SDN) is a networking paradigm to enable dynamic, flexible,
and programmatically efficient configuration of networks to revolutionize network control and …

Unpacking Smart Campus Assessment: Developing a Framework via Narrative Literature Review

K Polin, T Yigitcanlar, T Washington, M Limb - Sustainability, 2024 - mdpi.com
The emergence of the smart campus approach for university campuses addresses the digital
transformation needs of higher education institutions, driven by the increasing capability and …

[PDF][PDF] Methodologies, Requirements, and Challenges of Cybersecurity Frameworks: A Review

AD Khaleefah, HM Al-Mashhadi - Iraqi Journal of Science, 2024 - iasj.net
As a result of the emergence of new business paradigms and the development of the digital
economy, the interaction between operations, services, things, and software across …

[PDF][PDF] Impact of AI on cybersecurity and security compliance

A Folorunso, T Adewumi, A Adewa… - Global Journal of …, 2024 - researchgate.net
Artificial Intelligence (AI) is transforming the field of cybersecurity and reshaping security
compliance practices. As cyber threats become increasingly complex, AI offers powerful …

[PDF][PDF] Security compliance and its implication for cybersecurity

A Folorunso, I Wada, B Samuel, V Mohammed - 2024 - researchgate.net
Security compliance plays a critical role in shaping and enhancing the cybersecurity posture
of organizations. It involves adhering to legal, regulatory, and industry standards that govern …

Autonomous Cybersecurity: Evolving Challenges, Emerging Opportunities, and Future Research Trajectories

A Dehghantanha, A Yazdinejad, RM Parizi - Proceedings of the …, 2023 - dl.acm.org
Autonomous cybersecurity represents a significant advancement in information security,
enabling systems to autonomously detect, respond to, and mitigate cyber threats without …

[PDF][PDF] A discussion on ethical cybersecurity issues in digital service chains

F Tronnier, S Pape, S Löbner… - Cybersecurity of digital …, 2022 - library.oapen.org
Enabling cybersecurity and protecting personal data are crucial challenges in the
development and provision of digital service chains. Data and information are the key …

Attribute-Based Management of Secure Kubernetes Cloud Bursting

M Femminella, M Palmucci, G Reali… - IEEE Open Journal of …, 2024 - ieeexplore.ieee.org
In modern cloud computing, the need for flexible and scalable orchestration of services,
combined with robust security measures, is paramount. In this paper, we propose an …

[HTML][HTML] E-SCORE: A web-based tool for security requirements engineering

H Hnaini, R Mazo, J Champeau, P Vallejo, J Galindo - SoftwareX, 2024 - Elsevier
As digital systems continue to grow in popularity, they also become more vulnerable to
various forms of attacks with various motives, including financial gain and political influence …

Old Keys May Not Open New Doors: The Necessity of Agility in Cybersecurity Policymaking

M Afshari-Mofrad, B Abedin, A Amrollahi - 2022 - aisel.aisnet.org
The volatile and dynamic nature of cyberspace has raised concerns over security and
organisations are trying to make policies to protect their digital assets. However …