• Home
  • CitiGroup
  • Department of Information Technology
  • Suryaprakash Nalluri
Suryaprakash Nalluri

Suryaprakash Nalluri
Verified
Suryaprakash verified their affiliation via an institutional email.
Verified
Suryaprakash verified their affiliation via an institutional email.
  • Master of Information Secuity
  • cyber security specialist at CitiGroup

About

10
Publications
518
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
17
Citations
Current institution
CitiGroup
Current position
  • cyber security specialist
Additional affiliations
CitiGroup
Position
  • Manager

Publications

Publications (10)
Chapter
This chapter explores the use of IoT-enabled ITS technologies to optimize urban transport, reduce fuel consumption, and decrease greenhouse gas emissions. ITS can enable dynamic traffic management, predictive maintenance, and efficient route planning by using real-time data from connected sensors, vehicles, and infrastructure. Furthermore, the pape...
Article
Full-text available
In today's digital age, the importance of healthcare security is more critical than ever as electronic Protected Health Information (ePHI) becomes increasingly pervasive and privacy compliance is imperative everywhere. The paper covers some of the vulnerabilities and threats in handling Protected Health Information (PHI) in healthcare systems. Rans...
Article
Full-text available
Most thriving software development exemplification is DevOps that focuses on the thematic study of the challenges faced while adopting DevSecOps, identifies gaps that require further future research. For this, an exhaustive literature survey is performed to demonstrate that Shift-left security approach and continuous security assessment are key rec...
Article
Full-text available
The adoption of open-source libraries in software development has revolutionized the industry, offering significant benefits such as reusability, reduced costs, and accelerated development cycles. However, this practice also introduces a variety of security risks and challenges, particularly concerning the software supply chain. This paper explores...
Article
Full-text available
It starts with a case review of the special characteristics of the cloud computing threat and vulnerability, such as data leakage, inside threats, shared resources vulnerabilities. A review of the literature on current models and tools for managing these risks, including the most relevant studies as well as Good Practice Guidelines. The book addres...

Network

Cited By