Insider threat Prediction Model on Information Leakage in Cloud Computing Environment
Cloud computing is a highly- scalable channel that enables the customers to receive IT related services over the internet at a reasonable price. Despite the security concern particularly on information leakage, the convenience and cost effectiveness of this technology with the growing demands for in...
| Main Author: | Saat, Rozaidah |
|---|---|
| Format: | Journal Article |
| Published: |
Institute of Information System & Research Center
2015
|
| Subjects: | |
| Online Access: | http://ijitcs.com/ijitcs_journal.php http://hdl.handle.net/20.500.11937/62136 |
Similar Items
Insider threat: A critical review of the literature
by: Munshi, Asmaa, et al.
Published: (2012)
by: Munshi, Asmaa, et al.
Published: (2012)
A study of insider threat behaviour: developing a holistic framework
by: Munshi, Asmaa
Published: (2010)
by: Munshi, Asmaa
Published: (2010)
Insider threat behavior factors: a comparison of theory with reported incidents
by: Munshi, A., et al.
Published: (2012)
by: Munshi, A., et al.
Published: (2012)
A human centric approach to unintentional insider threat: development of a sociotechnical framework
by: Khan, Neeshe
Published: (2023)
by: Khan, Neeshe
Published: (2023)
Information and knowledge leakage in supply chain
by: Tan, Kim Hua, et al.
Published: (2016)
by: Tan, Kim Hua, et al.
Published: (2016)
A systematic mapping on risks and techniques to enhance security in multi-cloud environments
by: Gonzalez Alberto, Ana Y
Published: (2017)
by: Gonzalez Alberto, Ana Y
Published: (2017)
Sex differences in discriminating between cues predicting threat and safety
by: Day, Harriet L., et al.
Published: (2016)
by: Day, Harriet L., et al.
Published: (2016)
Carbon leakage and the argument from no difference
by: Rendall, Matthew
Published: (2015)
by: Rendall, Matthew
Published: (2015)
Organizational level continuance model of cloud computing for higher education institutions
by: Mohammed, Qasem Yousef Abdulelah
Published: (2021)
by: Mohammed, Qasem Yousef Abdulelah
Published: (2021)
An explanatory case study on cloud computing applications in the built environment
by: Chong, Heap Yih, et al.
Published: (2014)
by: Chong, Heap Yih, et al.
Published: (2014)
Turning down the gas: what is the potential for microbial detection of methane leakage from soils?
by: Bott, Tom
Published: (2022)
by: Bott, Tom
Published: (2022)
Conflict and comedy. Insults, threats, and slapstick in the plays of Aristophanes
by: Donelan, J. F.
Published: (2019)
by: Donelan, J. F.
Published: (2019)
Perceptions of stalking: a comparison of the prior-relationship misconception and perceptions of threat for transgender and cisgender perpetrators
by: Cook, Lydia Caroline
Published: (2020)
by: Cook, Lydia Caroline
Published: (2020)
Performance analysis on multi-attribute combinatorial double auction model for resource allocation in cloud computing
by: Mohamed El-Sherksi, Suad Abdalla
Published: (2017)
by: Mohamed El-Sherksi, Suad Abdalla
Published: (2017)
SLA-Based Trust Model for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Exfiltration from sewers: effects of different types of leakage / Mohd Ashaari Ab Wahab ... [et al.]
by: Ab Wahab, Mohd Ashaari, et al.
Published: (2006)
by: Ab Wahab, Mohd Ashaari, et al.
Published: (2006)
Impatient job scheduling under cloud computing
by: Mahdi, Nawfal A.
Published: (2012)
by: Mahdi, Nawfal A.
Published: (2012)
A platform for controlling robotic manipulators using cloud computing power
by: Moghrabiah, Mohammed Yasser
Published: (2019)
by: Moghrabiah, Mohammed Yasser
Published: (2019)
Cloud Assessment Learning Environment
by: Steele, A., et al.
Published: (2014)
by: Steele, A., et al.
Published: (2014)
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
by: Sa'ad, Suleiman
Published: (2022)
by: Sa'ad, Suleiman
Published: (2022)
A survey on SLA and performance measurement in cloud computing
by: Alhamad, Mohammed, et al.
Published: (2011)
by: Alhamad, Mohammed, et al.
Published: (2011)
Resource allocation for job optimization in multi-cloud environment
by: Mohamaddiah, Mohd Hairy
Published: (2023)
by: Mohamaddiah, Mohd Hairy
Published: (2023)
Confinement of nanostructured CeO2 inside carbon nanotubes
by: Agasti, Nityananda
Published: (2018)
by: Agasti, Nityananda
Published: (2018)
Paranoid thinking, cognitive bias and dangerous neighbourhoods: implications for
perception of threat and expectation of victimisation
by: Jack, Alexander, et al.
Published: (2016)
by: Jack, Alexander, et al.
Published: (2016)
Workflow system for MapReduce in cloud environment
by: Wadi, Muntadher Saadoon
Published: (2017)
by: Wadi, Muntadher Saadoon
Published: (2017)
Scheduling tight deadlines for scientific workflows in the cloud
by: Bajaher, Awadh Salem Saleh
Published: (2018)
by: Bajaher, Awadh Salem Saleh
Published: (2018)
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
by: Fadhil, Mohammed Alaa
Published: (2023)
by: Fadhil, Mohammed Alaa
Published: (2023)
An optimal tasks scheduling algorithm based on QoS in cloud computing network
by: Alhakimi, Mohammed Ameen Mohammed Abdo
Published: (2017)
by: Alhakimi, Mohammed Ameen Mohammed Abdo
Published: (2017)
Childhood bullying, paranoid thinking, and the misappraisal of social threat: trouble at school
by: Jack, Alexander H., et al.
Published: (2017)
by: Jack, Alexander H., et al.
Published: (2017)
Unstructured big data processing in cloud computing environment by using Amazon Elastic Map Reduce
by: Busu, Norzaharawani
Published: (2017)
by: Busu, Norzaharawani
Published: (2017)
Conceptual SLA Framework for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Response time for cloud computing providers
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Quality of service model for software as a service in cloud computing from users' and providers' perspectives
by: Khanjani, Atieh
Published: (2015)
by: Khanjani, Atieh
Published: (2015)
Achieving the desired transformer leakage inductance necessary in DC-DC converters for energy storage applications
by: De, D., et al.
Published: (2012)
by: De, D., et al.
Published: (2012)
A Framework for User Feedback Based Cloud Service Monitoring
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018)
by: Rashid, Mustafa Noori
Published: (2018)
Self-healing framework for service level agreement monitoring and violation reacting in cloud computing
by: Mosallanejad, Ahmad
Published: (2014)
by: Mosallanejad, Ahmad
Published: (2014)
Insider trading on the UK stock market: information contents and managerial incentives
by: Ajlouni, Moh'd Mahmoud
Published: (2004)
by: Ajlouni, Moh'd Mahmoud
Published: (2004)
Representing ecological threats and negotiating green built environment
by: Kerr, Thor Antony
Published: (2012)
by: Kerr, Thor Antony
Published: (2012)
Information leakage through online social networking: Opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010)
Similar Items
-
Insider threat: A critical review of the literature
by: Munshi, Asmaa, et al.
Published: (2012) -
A study of insider threat behaviour: developing a holistic framework
by: Munshi, Asmaa
Published: (2010) -
Insider threat behavior factors: a comparison of theory with reported incidents
by: Munshi, A., et al.
Published: (2012) -
A human centric approach to unintentional insider threat: development of a sociotechnical framework
by: Khan, Neeshe
Published: (2023) -
Information and knowledge leakage in supply chain
by: Tan, Kim Hua, et al.
Published: (2016)