Enhancing Workflow Security in Multi-Cloud Environments through Monitoring and Adaptation upon Cloud Service and Network Security Violations.
Nafiseh SoveiziDimka KarastoyanovaPublished in: CoRR (2023)
Keyphrases
- network security
- cloud services
- cloud computing
- intrusion detection
- situation assessment
- computer networks
- security breaches
- network monitoring
- information security
- security policies
- wireless sensor
- network traffic
- cloud storage
- intrusion detection system
- computing resources
- virtual machine
- security protection
- service providers
- cloud infrastructure
- data center
- risk assessment
- network administrators
- anomaly detection
- real time
- dos attacks
- mobile services
- network access
- data mining
- cyber security
- web services
- distributed computing
- data management
- user experience
- real world
- business models