Browsing by Author "Hussein A."
Now showing items 1-2 of 2
-
Systematic identification of threats in the cloud: A Survey
Hong J.B.; Nhlabatsi A.; Kim D.S.; Hussein A.; Fetais N.; Khan K.M.... more authors ... less authors ( Elsevier B.V. , 2019 , Article)When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ... -
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud
Nhlabatsi A.; Hussein A.; Fernandez R.; Fetais N.; Hong J.; Kim D.; Khan K.M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ...