Ernő Rigó
YOU?
Author Swipe
View article: Low-impact, near real-time risk assessment for legacy IT infrastructures
Low-impact, near real-time risk assessment for legacy IT infrastructures Open
In an era where cybersecurity threats are evolving at an unprecedented pace, this paper introduces a methodology for near real-time risk assessment of high-profile, high security infrastructures, where data security and operational continu…
View article: Implementation of Network Data Analysis Using the Neo4j Graph Database
Implementation of Network Data Analysis Using the Neo4j Graph Database Open
The analysis of network data is essential alongside the growth of digitalization and the Internet of Things (IoT). Managing complex connections in modern networks poses significant challenges for traditional relational databases due to the…
View article: A Comprehensive Study on the Dimensions of IaaS Security
A Comprehensive Study on the Dimensions of IaaS Security Open
In this paper we conduct a systematic exploration of the security considerations of Infrastructure-as-a-Service (IaaS) cloud deployments. These deployments are very common in the landscape of Research and Ecudation as well as the corporate…
View article: Experiences With Deep Learning Enhanced Steering Mechanisms for Debugging of Fundamental Cloud Services
Experiences With Deep Learning Enhanced Steering Mechanisms for Debugging of Fundamental Cloud Services Open
Cloud architecture blueprints or reference architectures allow the reuse of existing knowledge and best practices when creating new cloud native solutions. Therefore, debugging of reference architecture candidates (or their new versions) i…
View article: The Past, Present and Future of the ELKH Cloud
The Past, Present and Future of the ELKH Cloud Open
This review article summarizes the history the Hungarian Scientific Cloud Infrastructure project. This research infrastructure was launched officially on 1 October 2016, funded by the Hungarian Academy of Sciences. With the support of ELKH…
View article: Security checklist for IaaS cloud deployments
Security checklist for IaaS cloud deployments Open
In this article, we provide a cloud-security checklist for IaaS cloud deployments. The elements of the checklist are established by surveying the related literature on cloud-threat models and various security recommendations. We define the…