
Suryaprakash Nalluri- Master of Information Secuity
- cyber security specialist at CitiGroup
Suryaprakash Nalluri
- Master of Information Secuity
- cyber security specialist at CitiGroup
About
10
Publications
518
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
17
Citations
Introduction
Current institution
Additional affiliations
Publications
Publications (10)
This chapter explores the use of IoT-enabled ITS technologies to optimize urban transport, reduce fuel consumption, and decrease greenhouse gas emissions. ITS can enable dynamic traffic management, predictive maintenance, and efficient route planning by using real-time data from connected sensors, vehicles, and infrastructure. Furthermore, the pape...
In today's digital age, the importance of healthcare security is more critical than ever as electronic Protected Health Information (ePHI) becomes increasingly pervasive and privacy compliance is imperative everywhere. The paper covers some of the vulnerabilities and threats in handling Protected Health Information (PHI) in healthcare systems. Rans...
Most thriving software development exemplification is DevOps that focuses on the thematic study of the challenges faced while adopting DevSecOps, identifies gaps that require further future research. For this, an exhaustive literature survey is performed to demonstrate that Shift-left security approach and continuous security assessment are key rec...
The adoption of open-source libraries in software development has revolutionized the industry, offering significant benefits such as reusability, reduced costs, and accelerated development cycles. However, this practice also introduces a variety of security risks and challenges, particularly concerning the software supply chain. This paper explores...
It starts with a case review of the special characteristics of the cloud computing threat and vulnerability, such as data leakage, inside threats, shared resources vulnerabilities. A review of the literature on current models and tools for managing these risks, including the most relevant studies as well as Good Practice Guidelines. The book addres...