Articles
- Vol.23, No.1, 2025
- Vol.22, No.6, 2024
- Vol.22, No.5, 2024
- Vol.22, No.4, 2024
- Vol.22, No.3, 2024
- Vol.22, No.2, 2024
- Vol.22, No.1, 2024
- Vol.21, No.6, 2023
- Vol.21, No.5, 2023
- Vol.21, No.4, 2023
- Vol.21, No.3, 2023
- Vol.21, No.2, 2023
- Vol.21, No.1, 2023
- Vol.20, No.6, 2022
- Vol.20, No.5, 2022
- Vol.20, No.4, 2022
- Vol.20, No.3, 2022
- Vol.20, No.2, 2022
- Vol.20, No.1, 2022
- Vol.19, No.6, 2021
- Vol.19, No.5, 2021
- Vol.19, No.4, 2021
- Vol.19, No.3, 2021
- Vol.19, No.2, 2021
- Vol.19, No.1, 2021
This research develops a resilient cloud forensics framework to trace threats in microservices. Real-time logs and metadata from containers are analyzed using dynamic trace linking algorithms, enabling security teams to reconstruct and mitigate attacks across ephemeral cloud environments efficiently.
Leonard Francis Whitmore, Emilia Rose Cartwright, Hugo Patrick Denham, Beatrice Elise Wadsworth, Theodore James Bexley
Paper ID: 72422101 | ✅ Access Request |
The paper presents a zero trust-based access control design for securing communications between cloud and edge nodes. It integrates continuous identity validation, policy enforcement, and behavioral modeling, significantly reducing the risk of lateral movement by malicious agents in cloud networks.
Harvey Dominic Fenwick, Georgia May Chamberlain, Albert Owen Radcliffe, Florence Matilda Worsley, Arthur Samuel Pennant
Paper ID: 72422102 | ✅ Access Request |
This study implements AI-based sequential feature embedding to enhance malware classification in cloud sandboxing setups. The model analyzes runtime behavior logs, generating sequence-aware embeddings to detect evasive malware patterns and support intelligent cloud-native threat isolation strategies.
Juliet Alexandra Fleetwood, Marcus Daniel Hatherley, Victoria Anne Rosendale, Sebastian Philip Newcombe, Alice Catherine Enderby
Paper ID: 72422103 | ✅ Access Request |
This paper presents a novel one-class graph neural network model to detect anomalies in cloud-native network traffic. It leverages unsupervised graph representations of communication flows, enabling scalable and low-overhead identification of outliers without relying on labeled attack datasets.
Thomas Julian Bradshaw, Felicity Ruth Nightingale, Owen Maxwell Carver, Helena Sophie Chadwick, George Louis Whitfield
Paper ID: 72422104 | ✅ Access Request |
This research integrates biometric authentication and hash-based verification to create a secure multi-factor access mechanism for cloud workflows. The proposed protocol enhances identity confidence levels while maintaining user convenience across federated applications managing sensitive healthcare and finance-related data streams.
Eleanor Bridget Dalrymple, Hugo Benedict Farnsworth, Poppy Helena Stratton, Laurence Edward Loxley, Isabelle Charlotte Tresillian
Paper ID: 72422105 | ✅ Access Request |
This study introduces a federated transformer architecture for detecting intrusions in encrypted cloud environments. It utilizes attention mechanisms to interpret behavioral anomalies across decentralized datasets without compromising privacy, enabling collaborative threat detection for secure multi-tenant cloud infrastructures.
Gregory Nathaniel Ashford, Clara Josephine Pickering, Samuel Felix Hartley, Evelyn Grace Mortimer, Nicholas George Ellsworth
Paper ID: 72422106 | ✅ Access Request |
The paper presents a blockchain-based logging framework for serverless cloud applications to preserve forensic integrity. Immutable records enhance incident attribution and accountability, ensuring verifiable chains of custody in post-breach analyses across decentralized cloud-native execution environments.
Frederick Lionel Cranleigh, Amelia Francesca Redgrave, Rupert Anthony Lytton, Charlotte Isobel Gainsborough, Henry Walter Beckford
Paper ID: 72422107 | ✅ Access Request |
Back