Artificial Intelligence and Cybersecurity 2021
DOI: 10.1201/9781003097518-4
|View full text |Cite
|
Sign up to set email alerts
|

Cyberattacks and Risk Management Strategy in Internet of Things Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Addressing insider threats has also been a focus of research, centering on individual with legitimate database access who misuse their privileges for unauthorized activities.The analysis of log files empowers forensic investigators to pinpoint attack vectors, track the actions of malicious actors, and reconstruct the sequence of events, facilitat ing effective incident response and mitigation strategies. 10 In the experimental phase, a cloud environment was constructed using open-source cloud data center software or popular public cloud platforms such as AWS and Google Cloud. Previous studies A range of techniques and algorithms have been developed to enhance cloud security.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Addressing insider threats has also been a focus of research, centering on individual with legitimate database access who misuse their privileges for unauthorized activities.The analysis of log files empowers forensic investigators to pinpoint attack vectors, track the actions of malicious actors, and reconstruct the sequence of events, facilitat ing effective incident response and mitigation strategies. 10 In the experimental phase, a cloud environment was constructed using open-source cloud data center software or popular public cloud platforms such as AWS and Google Cloud. Previous studies A range of techniques and algorithms have been developed to enhance cloud security.…”
Section: Literature Surveymentioning
confidence: 99%
“…Additionally, Deng et al, 2017 5 leveraged the MapReduce framework to enhance algorithm performance.This paper concludes by highlighting the significance of various approaches to data protection, ranging from partition techniques 6 to blockchain-enabled distributed security frameworks, 7 in addressing threats such as DDoS attacks, 8 intrusion detection, 9 and zero-trust security frameworks. 10,11 Apart from techniques and algorithms to enhance cloud security, various aspects of data analysis, machine learning, and visualization have been reported in literature. [12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30] The amalgamation of these contributions underscores the continuous evolution of cloud security strategies and the persistent pursuit of robust data protection measures.…”
Section: Literature Surveymentioning
confidence: 99%