1 |
Salman Iqbal, Miss Laiha Mat Kiah, Babak Dhaghighi, Muzammil Hussain, Suleman Khan, Muhammad Khurram Khan, and Kim-Kwang Raymond Choo, "On cloud security attacks: A taxonomy and intrusion detection and prevention as a service," J. Network and Computer App, vol. 74, pp. 98-120, 2016.
DOI
|
2 |
Mahesh Babu, B and Mary Saira Bhanu, "Prevention of insider attacks by integrating behavior analysis with risk based access control model to protect cloud," Procedia Computer Science, vol. 54, pp. 157-166, 2015.
DOI
|
3 |
Firoz Kabir, M, and Sven Hartmann, "Cyber security challenges: An efficient intrusion detection system design," in Proc. of Int. Young Engineers Forum (YEF-ECE), IEEE, pp. 19-24, 2018.
|
4 |
Gopal Singh Kushwah, and Virender Ranga, "Voting extreme learning machine based distributed denial of service attack detection in cloud computing," J. Info Security and App, vol. 53, pp. 102532, 2020.
DOI
|
5 |
Velliangiri, S, and Hari Mohan Pandey, "Fuzzy-Taylor-elephant herd optimization inspired Deep Belief Network for DDoS attack detection and comparison with state-of-the-arts algorithms," Future Generation Computer Systems, vol. 110, pp. 80-90, 2020.
DOI
|
6 |
Ihsan Abdulqadder H, Shijie Zhou, Deqing Zou, Israa T. Aziz, and Syed Muhammad Abrar Akber, "Multi-layered intrusion detection and prevention in the sdn/nfv enabled cloud of 5G networks using AI-based defense mechanisms," Computer Networks, vol. 179, pp. 107364, 2020.
DOI
|
7 |
Mohamed Yassin, Chamseddine Talhi, and Hanifa Boucheneb, "ITADP: an inter-tenant attack detection and prevention framework for multi-tenant SaaS," J. Info. Security and App, vol. 49, pp. 102395, 2019.
DOI
|
8 |
Hicham Toumi, Fatima Zahra Fagroud, Amiyne Zakouni, and Mohamed Talea, "Implementing Hy-IDS, mobiles agents and virtual firewall to enhance the security in IaaS Cloud," Procedia Computer Science, vol. 160, pp. 819-824, 2019.
DOI
|
9 |
Madhan, E.S., "Pharmacovigilance predictive analysis using NLP-based cloud," Int. J. Biomed. Eng and Tech., 26, 316, 2018.
DOI
|
10 |
Dina Moloja, and Noluntu Mpekoa, "Towards a cloud intrusion detection and prevention system for m-voting in south africa," in Proc. of Int. Conf. Info Society (i-Society), IEEE, pp. 34-39, 2017.
|
11 |
S. Neelakandan, Muthukumaran, S., "Transformation-based Optimizations Framework (ToF) for Workflows and its Security issues in the Cloud Computing," Int. J. Eng and Computer Sci., 4(08), 2015.
|
12 |
MGM Mehedi Hasan, and Mohammad Ashiqur Rahman, "A signaling game approach to mitigate co-resident attacks in an IaaS cloud environment," J. Info. Security and App, vol. 50, pp. 102397, 2020.
DOI
|
13 |
Saurabh Dey, Qiang Ye, and Srinivas Sampalli, "A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks," Info. Fusion, vol. 49, pp. 205-215, 2019.
DOI
|
14 |
Uma Narayanan, Varghese Paul, and Shelbi Joseph, "A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment," J. King Saud University-Computer and Info Sci., 2020.
|
15 |
Neelakandan, S., Paulraj, D., "An automated exploring and learning model for data prediction using balanced CA-SVM," J Ambient Intell Human Computer, vol. 12, pp. 4979-7990, 2021.
DOI
|
16 |
Aviad Cohen, Nir Nissim, and Yuval Elovici, "Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods," Expert Sys with App, vol. 110, pp. 143-169, 2018.
DOI
|
17 |
Mahdi Rabbani, Yong Li Wang, Reza Khoshkangini, Hamed Jelodar, Ruxin Zhao, and Peng Hu, "A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing," J. Network and Computer App, vol. 151, pp. 102507, 2020.
DOI
|
18 |
Kanimozhi, V., and Prem Jacob T, "Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing," in Proc. of Int. conf. Communication and Signal Processing (ICCSP), IEEE, pp. 0033-0036, 2019.
|
19 |
Madhan, E. S., Neelakandan, S., Annamalai, R., "A Novel Approach for Vehicle Type Classification and Speed Prediction Using Deep Learning," J. Computational and Theoretical Nanoscience, American Scientific Publishers, Vol 17, N0 5, pp. 2237-2242, May 2020.
DOI
|
20 |
Xiong Li, Yongping Xiong, Jian Ma, and Wendong Wang, "An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards," J. Network and Computer App, vol. 35, no. 2, pp. 763-769, 2012.
DOI
|
21 |
Deebak, B. D, Fadi Al-Turjman, and Leonardo Mostarda, "Seamless secure anonymous authentication for cloud-based mobile edge computing," Computers & Electrical Eng, vol. 87, pp. 106782, 2020.
DOI
|
22 |
Gayatri Pandi S, Saurabh Shah, and K. H. Wandra, "Exploration of vulnerabilities, threats and forensic issues and its impact on the distributed environment of cloud and its mitigation," Procedia Computer Sci, vol. 167, pp. 163-173, 2020.
DOI
|
23 |
Amandeep Singh Sohal, Rajinder Sandhu, Sandeep K. Sood, and Victor Chang, "A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments," Computers & Security, vol. 74, pp. 340-354, 2018.
DOI
|
24 |
Aviad Cohen, and Nir Nissim, "Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory," Expert Sys with App, vol. 102, pp. 158-178, 2018.
DOI
|
25 |
Asimi Ahmed, and Tbatou Zakariae, "IaaS cloud model security issues on behalf cloud provider and user security behaviors," Procedia computer sci, vol. 134, pp. 328-333, 2018.
DOI
|