[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

Botnet attack detection in iot using machine learning

K Alissa, T Alyas, K Zafar, Q Abbas… - Computational …, 2022 - Wiley Online Library
There are an increasing number of Internet of Things (IoT) devices connected to the network
these days, and due to the advancement in technology, the security threads and …

[PDF][PDF] Performance Framework for Virtual Machine Migration in Cloud Computing.

T Alyas, TM Ghazal, BS Alfurhood, M Ahmad… - … , Materials & Continua, 2023 - academia.edu
In the cloud environment, the transfer of data from one cloud server to another cloud server
is called migration. Data can be delivered in various ways, from one data centre to another …

[PDF][PDF] Optimizing Resource Allocation Framework for Multi-Cloud Environment.

T Alyas, TM Ghazal, BS Alfurhood… - … Materials & Continua, 2023 - cdn.techscience.cn
Cloud computing makes dynamic resource provisioning more accessible. Monitoring a
functioning service is crucial, and changes are made when particular criteria are surpassed …

Triple-Entry Accounting (TEA) and Blockchain Implementation in Accounting and Finance-A Survey

R Joseph, R Sharma, MI Sarwar, I Khan… - … for Technology and …, 2023 - ieeexplore.ieee.org
Accounting practices are based on their underlying accounting principles, and currently, the
Double-Entry Accounting (DEA) is used in both manual and computer-based Accounting …

[HTML][HTML] Navigating the Multi-cloud Maze: benefits, challenges, and Future trends

D Seth, H Nerella, M Najana… - International Journal of …, 2024 - ijgis.pubpub.org
The article revealed an in-depth outcome of the multi-cloud method, meaning what it is, why
it is crucial, the advantages, drawbacks, best practices, future forecasts, and practical cases …

AI-HybridChain: Picturized Authentication and DRL based Access Control Method with Secure Two Fold Revocation for Ensuring Cloud Computing Security

SC Krishnan - Future Generation Computer Systems, 2024 - Elsevier
The Internet of Things is susceptible to seepage of private information during the data
sharing. To circumvent this problem, access control and secure data sharing have been …

[PDF][PDF] Security Challenges and Solutions in Multi-Cloud Environments

S Kanungo - Stochastic Modelling and Computational Sciences - romanpub.com
Aim: This research paper aims to examine common security requirements and solutions in
multi-cloud environments providing insights into the complexities faced by organizations …

A Comparison of Re-Sampling Techniques for Detection of Multi-Step Attacks on Deep Learning Models

MH Jamal, N Naz, MAK Khattak, F Saeed… - IEEE …, 2023 - ieeexplore.ieee.org
The increasing dependence on data analytics and artificial intelligence (AI) methodologies
across various domains has prompted the emergence of apprehensions over data security …

[PDF][PDF] Strengthening Network Security: Evaluation of Intrusion Detection and Prevention Systems Tools in Networking Systems

AP Wahyu, K Fauziah, AS Nahrowi… - … Journal of Advanced …, 2023 - researchgate.net
This study aims to enhance network security by comprehensively evaluating various
Intrusion Detection and Prevention Systems tools in networking systems. The objectives of …