Cloud Outsourcing Risk Management for Cloud Consumers: A Systematic Literature Review

MYM Haq, S Anand, A Abhishta… - ACM computing …, 2024 - research.utwente.nl
This systematic literature review explores the landscape of risks and risk management
techniques in cloud outsourcing, with a focus on assisting enterprise cloud consumers in …

Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning

H Li, Y Guo, S Huo, H Hu, P Sun - Science China Information Sciences, 2022 - Springer
Implementing defensive deception in the cloud is promising to proactively counter
reconnaissance attack. This technique presents decoys to camouflage cloud assets and …

A stakeholder-oriented security analysis in virtualized 5G cellular networks

C Suraci, G Araniti, A Abrardo, G Bianchi, A Iera - Computer Networks, 2021 - Elsevier
Besides significantly outperforming past generations in terms of capacity and throughput, 5G
networks and systems will provide an infrastructure for the support of highly diversified …

Educational virtualization model in initial teacher training

C Atúncar-Prieto… - 2021 XVI Latin American …, 2021 - ieeexplore.ieee.org
As a consequence of social isolation the initial teacher training institutions had to establish a
recovery plan in the remote mode to guarantee the continuity of their professional careers …

Optimized deep learning‐based attack detection framework for secure virtualized infrastructures in cloud

B Gupta, N Mishra - International Journal of Numerical …, 2022 - Wiley Online Library
Virtualization is the foundation of cloud computing process and allows more effective
utilization of physical computer hardware. Virtualization technologies are used in various …

Intrusion Injection for Virtualized Systems: Concepts and Approach

CF Gonçalves, N Antunes… - 2023 53rd Annual IEEE …, 2023 - ieeexplore.ieee.org
Virtualization is drawing attention due to countless benefits, leaving Hypervisors with the
paramount responsibility for performance, dependability, and security. However, while there …

Detecting anomalies through sequential performance analysis in virtualized environments

CF Gonçalves, DS Menasché, A Avritzer… - IEEE …, 2023 - ieeexplore.ieee.org
Virtualization enables cloud computing, allowing for server consolidation with cost reduction.
It also introduces new challenges in terms of security and isolation, which are deterrents for …

Towards secured digital business ecosystems: From threats to opportunities

V Tornjanski, S Knežević, D Ljubanić, V Glišić… - E-business technologies …, 2021 - ebt.rs
This study aims at shedding more light on the values of the security landscape in the age of
rapid digital businesses ecosystems development. The purpose of the paper is to enrich …

A dynamic weighted averaging technique for trust assessment in cloud computing

S Mehraj, MT Banday - … of Cloud Applications and Computing (IJCAC …, 2022 - igi-global.com
In the Cloud computing, trust management has become a key requirement for its security as
it has an important role where service-interactions take place in an anonymous environment …

Investigating the possibilities for simulation of the interconnected electric power and communication infrastructures

M Vrtal, J Benedikt, R Fujdiak, D Topolanek, P Toman… - Processes, 2022 - mdpi.com
In recent years, we have seen an increasing dependency between different urban critical
infrastructures, which raises the demands on their analysis and cybersecurity. Current open …