Current status and security trend of osint

YW Hwang, IY Lee, H Kim, H Lee… - … and Mobile Computing, 2022 - Wiley Online Library
Recently, users have used open‐source intelligence (OSINT) to gather and obtain
information regarding the data of interest. The advantage of using data gathered by OSINT is …

Fast Anomaly Detection for IoT Services Based on Multi-source Log Fusion

X Jiang, H Luo, Y Sun, M Guizani - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the fast development of Internet of Things (IoT), anomaly detection has recently become
a common concern for IoT smart applications. The circuit detection mode of all services to …

Continuous compliance

M Kellogg, M Schäf, S Tasiran, MD Ernst - Proceedings of the 35th IEEE …, 2020 - dl.acm.org
Vendors who wish to provide software or services to large corporations and governments
must often obtain numerous certificates of compliance. Each certificate asserts that the …

基于拟态架构的内生安全云数据中心关键技术和实现方法

张帆, 谢光伟, 郭威, 扈红超, 张汝云, 刘文彦 - 电信科学, 2021 - infocomm-journal.com
摘要云数据中心是新一代信息基础设施的代表, 其安全问题也成为近年来备受关注的焦点,
具有重要的意义. 首先, 在对现有云安全形势分析的基础上, 通过新兴的内生安全概念探索云数据 …

Taxonomy & analysis of cloud computing vulnerabilities through attack vector, CVSS and complexity parameter

N Mishra, RK Singh - … Conference on Issues and Challenges in …, 2019 - ieeexplore.ieee.org
The world is witnessing an exceptional expansion in the cloud enabled services which is
further growing day by day due to advancement & requirement of technology. However, the …

Deaps: Deep learning-based user-level proactive security auditing for clouds

M Ou, L Wang, H Xun - 2019 IEEE Global Communications …, 2019 - ieeexplore.ieee.org
Auditing security compliance with respect to security standards and policies becomes
increasingly important in clouds for ensuring the transparency and accountability of a cloud …

Lightweight verification via specialized typecheckers

M Kellogg - Proceedings of the 29th ACM Joint Meeting on …, 2021 - dl.acm.org
Testing and other unsound analyses are developer-friendly but cannot give guarantees that
programs are free of bugs. Verification and other extant sound approaches can give …

Continuous audit: A framework for banking sector

MGF Correia - 2024 - repositorio.iscte-iul.pt
The digital transformation of business processes, the increase in available information, and
the continuous technological evolution have shaped the practice of auditing, making it more …

Dynamic Access Control Solution for Cross-Tenancy in a Cloud Environment

S Garg, D Mehrotra, S Bhartiya - Security Issues and Privacy Threats in …, 2021 - Springer
Data sharing in an interoperable environment enhances the productivity and quality of
services in the respective organizations. The organizations these days have been moving …

Securing Cloud from Data Misconfiguration using Cryptographic Techniques

MM Raj, PM Pawar, R Muthalagu - … International Conference on …, 2022 - ieeexplore.ieee.org
The advent of cloud computing has made data accessible anytime, anywhere. The past few
years have seen a boom in organisations migrating to cloud computing. How far are the …