[1] |
HY Kim and KH Han and SS Shin. {A Model for Self-Authentication Based on Decentralized Identifier}. Journal of Convergence for Information Technology. 11: 66-74, 2021. [DOI ] |
[2] |
Youngjun Song and Sunghyuck Hong. {BUILD A SECURE SMART CITY BY USING BLOCKCHAIN AND DIGITAL TWIN}. International Journal of Advanced Science and Convergence. 3: 9-13, 2021. [DOI ] |
[3] |
Keping Yu and Long Lin and Mamoun Alazab and Tan Liang. {Deep Learning-Based Traffic Safety Solution for a Mixture of Autonomous and Manual Vehicles in a 5G-Enabled Intelligent Transportation System}. IEEE Transactions on Intelligent Transportation Systems. 1-11, 2020. [DOI ] |
[4] |
Umesh Kumar Singh and Abhishek Sharma. {Cloud Computing Security Framework Based on Shared Responsibility Models}. Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0. 17, 2021. |
[5] |
Jeevith Hegde and Børge Rokseth. {Applications of machine learning methods for engineering risk assessment – A review}. Elsevier- Safety Science. 2019. [DOI ] |
[6] |
Daniel S. Berman and Anna L. Buczak and Jeffrey S. Chavis and Cherita L. Corbett. {A survey of deep learning methods for cyber security}. MDPI. 2019. [DOI ] |
[7] |
Varsha, Amit Wadhwa, Swati Gupta. {Study of Security Issues in Cloud Computing}. International Journal of Computer Science and Mobile Computing. 4: 230 – 234, 2015. |
[8] |
Abhishek Sharma and Umesh Kumar Singh. {Modelling of smart risk assessment approach for cloud computing environment using AI \& supervised machine learning algorithms}. Global Transitions Proceedings. 2022. [DOI ] |
[9] |
{RETRACTED ARTICLE: An optimised homomorphic CRT-RSA algorithm for secure and efficient communication}. Springer-Personal and Ubiquitous Computing. 27: 1405–1418, 2021. [DOI ] |
[10] |
Arfa Arslaan Ikram and Abdul Rehman Javed and Muhammad Rizwan and Rabia Abid. {Mobile Cloud Computing Framework for Securing Data}. 44th International Conference on Telecommunications and Signal Processing (TSP)IEEE . 2021. [DOI ] |
[11] |
Maryam Shabbir and Ayesha Shabbir and Celestine Iwendi and Abdul Rehman Javed. {Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing}. IEEE. 9: 8820 - 8834, 2021. [DOI ] |
[12] |
Tian Xia and Hironori Washizaki and Yoshiaki Fukazawa and Haruhiko Kaiya. {CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development}. International Journal of Systems and Software Security and Protection. 12: 2021. [DOI ] |
[13] |
Reza Montasari and Alireza Daneshkhah and Hamid Jahankhani and Amin Hosseinian-Far . {Cloud Computing Security: Hardware-Based Attacks and Countermeasures}. Digital Forensic Investigation of Internet of Things (IoT) Devices . 155–167, 2020. |
[14] |
Marco Antonio Sotelo Monge and Jorge Maestre Vidal and . {Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge}. Elsevier. 125: 869-890, 2021. [DOI ] |
[15] |
Rahul Kumar and Kamalakanta Sethi and Nishant Prajapati and Rashmi Ranjan Rout;. {Machine Learning based Malware Detection in Cloud Environment using Clustering Approach}. IEEE. 2020. [DOI ] |
[16] |
Dharitri Tripathy and Rudrarajsinh Gohil and Talal Halabi. {Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning}. IEEE. 2020. [DOI ] |
[17] |
Umer Ahmed Butt and Rashid Amin and Hamza Aldabbas and Senthilkumar Mohan and Bader Alouffi and Ali Ahmadian . {Cloud-based email phishing attack using machine and deep learning algorithm}. Springer. 9: 3043–3070, 2022. [DOI ] |
[18] |
Abdullah Ajmal and Sundas Ibrar and Rashid Amin. {Cloud computing platform: Performance analysis of prominent cryptographic algorithms}. Wiley. 34: 2022. [DOI ] |
[19] |
Xiaoshuang Sun; Yu Wang; Zengkai Shi. {Insider Threat Detection Using An Unsupervised Learning Method: COPOD}. IEEE. 2021. [DOI ] |
[20] |
Gelli Ravikumar and Manimaran Govindarasu. {Anomaly Detection and Mitigation for Wide-Area Damping Control using Machine Learning}. IEEE. 1 - 1, 2020. [DOI ] |
[21] |
Sahil Garg and Kuljeet Kaur and Neeraj Kumar and Joel J. P. C. Rodrigues. {Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective}. IEEE. 21: 566 - 578, 2019. [DOI ] |
[22] |
Sangpyo Kim and Jongmin Kim and Michael Jaemin Kim and Wonkyung Jung and John Kim and Minsoo Rhu and Jung Ho Ahn. {BTS: an accelerator for bootstrappable fully homomorphic encryption}. ACM. 711 - 725, 2022. [DOI ] |
[23] |
Prabhat Kumar and Randhir Kumar and Gautam Srivastava and Govind P. Gupta. {PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities}. IEEE. 8: 2326 - 2341, 2021. [DOI ] |
[24] |
Jianxin Zhao and Richard Mortier and Jon Crowcroft and Liang Wang. {Privacy-Preserving Machine Learning Based Data Analytics on Edge Devices}. ACM. 341 - 346, 2018. [DOI ] |
[25] |
Mahdi Rabbani and Yong Li Wang and Reza Khoshkangini and Hamed Jelodar and Ruxin Zhao and Peng Hu. {A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing}. Elsevier. 151: 2020. [DOI ] |
[26] |
A. Nazreen Banu and K. Ram Kumar. {Cloud-Based Machine Learning Techniques With Intrusion Detection System}. IEEE. 2023. [DOI ] |
[27] |
Yu Liu a, Zhibo Pang and Magnus Karlsson and Shaofang Gong . {Anomaly detection based on machine learning in IoT-based vertical plant wall for indoor climate control}. Elsevier. 183: 2020. [DOI ] |
[28] |
Kelton A.P. da Costa and João P. Papa and Celso O. Lisboa and Roberto Munoz and Victor Hugo and de Albuquerque. {Internet of Things: A survey on machine learning-based intrusion detection approaches}. Elsevier- Computer Networks. 151: 147-157, 2019. [DOI ] |
[29] |
Jianguo Chen; Kenli Li; Philip S. Yu. Privacy-Preserving Deep Learning Model for Decentralized VANETs Using Fully Homomorphic Encryption and Blockchain{}. IEEE Transactions on Intelligent Transportation Systems . 23: 11633 - 11642, 2021. [DOI ] |
[30] |
Rajesh Bose; Srabanti Chakraborty; Sandip Roy. {Explaining the Workings Principle of Cloud-based Multi-factor Authentication Architecture on Banking Sectors}. IEEE. 2019. [DOI ] |
[31] |
Ahmed El Ouadrhiri; Ahmed Abdelhadi. {Differential Privacy for Deep and Federated Learning: A Survey}. IEEE. 10: 22359 - 22380, 2022. [DOI ] |
[32] |
Mohammed Nasser Al-Mhiqani and Rabiah Ahmad and Z. Zainal Abidin and Warusia Yassin and Aslinda Hassan and Karrar Hameed Abdulkareem and Nabeel Salih Ali and Zahri Yunos. {A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations}. MDPI. 10: 2020. [DOI ] |
[33] |
Youliang Tian; Ta Li; Jinbo Xiong; Md Zakirul Alam Bhuiyan; Jianfeng Ma; Chan. {A Blockchain-Based Machine Learning Framework for Edge Services in IIoT}. IEEE. 18: 1918 - 1929, 2021. [DOI ] |
[34] |
Abdul Salam Mohammad a, Manas Ranjan Pradhan b. {Machine learning with big data analytics for cloud security}. Elsevier. 96: 2021. [DOI ] |
[35] |
Omar A. Alzubi and Jafar A. Alzubi and Moutaz Alazab and Adnan Alrabea and Albara Awajan and Issa Qiqieh. {Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment}. MDPI. 11: 2022. [DOI ] |
[36] |
Z Guo and Y Shen and AK Bashir and M Imran and N Kumar and D Zhang, K Yu. {Robust spammer detection using collaborative neural network in Internet-of-Things applications}. IEEE Internet of Things Journal. 8: 9549 - 9558, 2021. [DOI ] |
[37] |
Duc-Nghia Tran and Tu N. Nguyen and Phung Cong Phi Khanh and Duc-Tan Tran and . {An IoT-Based Design Using Accelerometers in Animal Behavior Recognition Systems}. IEEE Sensors Journal. 22: 17515 - 17528, 2022. [DOI ] |
[38] |
Fucai Luo and Haiyan Wang and Al-Kuwari Saif and Weihong Han. {Multi-key Fully Homomorphic Encryption without CRS from RLWE}. Elsevier-Computer Standards \& Interfaces. 86: 2023. [DOI ] |
[39] |
Rashad Mahmood Saqib and Adnan Shahid Khan and Yasir Javed and Shakil Ahmad and Kashif Nisar and Irshad A. Abbasi and Muhammad Reazul Haque and Azlina Ahmadi Julaihi. {Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security}. Tech Science Press. 32: 2021. [DOI ] |
[40] |
Aqsa Mohiyuddin and Abdul Rehman Javed and Chinmay Chakraborty and Muhammad Rizwan and Maryam Shabbir and Jamel Nebhen . {Secure Cloud Storage for Medical IoT Data using Adaptive Neuro-Fuzzy Inference System}. International Journal of Fuzzy Systems. 24: 1203–1215, 2022. [DOI ] |
[41] |
Umer Ahmed Butt and Muhammad Mehmood and Syed Bilal Hussain Shah and Rashid Amin and M. Waqas Shaukat and Syed Mohsan Raza and Doug Young Suh and Md. Jalil Piran. {A review of machine learning algorithms for cloud computing security}. MDPI. 2020. [DOI ] |
[42] |
Semin Kim, Hyung-Jin Mun and Sunghyuck Hong. {Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal}. MDPI. 12: 2022. [DOI ] |
[43] |
Mudegol Nandinee. {Hybrid Encryption using Symmetric Block and Stream Cipher}. International Journal Of Engineering And Management Research. 13: 35-39, 2023. [DOI ] |
[44] |
Abhishek Sharma and Umesh Kumar Singh and Kamal Upreti and Dharmendra Singh Yadav. {An investigation of security risk \& taxonomy of Cloud Computing environment}. 2nd International Conference on Smart Electronics and Communication (ICOSEC). 2021. [DOI ] |
[45] |
G. Padmavathi; D. Shanmugapriya; S. Asha. {A Framework to Detect the Malicious Insider Threat in Cloud Environment using Supervised Learning Methods}. IEEE. 2022. [DOI ] |
[46] |
Simon Duque Anton and Suneetha Kanoor and Daniel Fraunholz and Hans Dieter Schotten. {Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set}. ACM. 1-9, 2018. [DOI ] |
[47] |
Muhammad Imran Tariq and Nisar Ahmed Memon and Shakeel Ahmed and Shahzadi Tayyaba and Muhammad Tahir Mushtaq and Natash Ali Mian and Muhammad Imran and Muhammad W. Ashraf. {A Review of Deep Learning Security and Privacy Defensive Techniques}. Wiley. 2020. [DOI ] |
[48] |
Mahmoud Abdelsalam; Ram Krishnan; Yufei Huang; Ravi Sandhu. {Malware Detection in Cloud Infrastructures Using Convolutional Neural Networks}. IEEE. 2018. [DOI ] |
[49] |
Folasade Mercy Okikiola; Abiodun Muyideen Mustapha; Adeniyi Foluso Akinsola. {A New Framework for Detecting Insider Attacks in Cloud-Based E-Health Care System}. IEEE. 2020. [DOI ] |
[50] |
Naghmeh Moradpoor Sheykhkanloo, Adam Hall. {Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset}. International Journal of Cyber Warfare and Terrorism (IJCWT) . 26, 2020. [DOI ] |
[51] |
Waqas Ahmad and Aamir Rasool and Abdul Rehman Javed and Thar Baker and Zunera Jalil. {Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey}. MDPI. 2021. [DOI ] |
[52] |
Duc C. Le; Nur Zincir-Heywood; Malcolm I. Heywood. {Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning}. IEEE. 17: 30 - 44, 2020. [DOI ] |
[53] |
Rakan A. Alsowail, Taher Al-Shehari. {Techniques and countermeasures for preventing insider threats}. PeerJ Computer Science. 2022. [DOI ] |
[54] |
Omar G. Abood, Shawkat K. Guirguis. {A Survey on Cryptography Algorithms}. International Journal of Scientific and Research Publications. 8: 2018. [DOI ] |
[55] |
Binita Thakkar, Dr. Blessy Thankachan. {A Survey for Comparative Analysis of various Cryptographic Algorithms used to Secure Data on Cloud}. International Journal of Engineering Research \& Technology (IJERT). 9: 2020. |