Enterprise data breach: causes, challenges, prevention, and future directions

L Cheng, F Liu, D Yao - Wiley Interdisciplinary Reviews: Data …, 2017 - Wiley Online Library
A data breach is the intentional or inadvertent exposure of confidential information to
unauthorized parties. In the digital era, data has become one of the most critical components …

Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions

M Mahbub, RM Shubair - Journal of Network and Computer Applications, 2023 - Elsevier
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …

A federated learning system with enhanced feature extraction for human activity recognition

Z Xiao, X Xu, H Xing, F Song, X Wang… - Knowledge-Based Systems, 2021 - Elsevier
With the rapid growth of mobile devices, wearable sensor-based human activity recognition
(HAR) has become one of the hottest topics in the Internet of Things. However, it is …

[HTML][HTML] A cloud-edge based data security architecture for sharing and analysing cyber threat information

DW Chadwick, W Fan, G Costantino… - Future generation …, 2020 - Elsevier
Cyber-attacks affect every aspect of our lives. These attacks have serious consequences,
not only for cyber-security, but also for safety, as the cyber and physical worlds are …

An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services

JA Onesimu, J Karthikeyan, Y Sei - Peer-to-Peer Networking and …, 2021 - Springer
The healthcare services industry has seen a huge transformation since the prominent rise of
the Internet of Things (IoT). IoT in healthcare services includes a large number of unified and …

Privacy-preserving DDoS attack detection using cross-domain traffic in software defined networks

L Zhu, X Tang, M Shen, X Du… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
Existing distributed denial-of-service attack detection in software defined networks (SDNs)
typically perform detection in a single domain. In reality, abnormal traffic usually affects …

A review on design inspired subsampling for big data

J Yu, M Ai, Z Ye - Statistical Papers, 2024 - Springer
Subsampling focuses on selecting a subsample that can efficiently sketch the information of
the original data in terms of statistical inference. It provides a powerful tool in big data …

The privacy implications of cyber security systems: A technological survey

E Toch, C Bettini, E Shmueli, L Radaelli… - ACM Computing …, 2018 - dl.acm.org
Cyber-security systems, which protect networks and computers against cyber attacks, are
becoming common due to increasing threats and government regulation. At the same time …

Less is more: Supporting developers in vulnerability detection during code review

L Braz, C Aeberhard, G Çalikli, A Bacchelli - Proceedings of the 44th …, 2022 - dl.acm.org
Reviewing source code from a security perspective has proven to be a difficult task. Indeed,
previous research has shown that developers often miss even popular and easy-to-detect …

A holistic view on data protection for sharing, communicating, and computing environments: Taxonomy and future directions

I Gupta, AK Singh - arXiv preprint arXiv:2202.11965, 2022 - arxiv.org
The data is an important asset of an organization and it is essential to keep this asset
secure. It requires security in whatever state is it ie data at rest, data in use, and data in …