A survey and taxonomy of DoS attacks in cloud computing
M Masdari, M Jalali - Security and Communication Networks, 2016 - Wiley Online Library
Abstract Denial‐of‐service (DoS) attacks are one of the major security challenges in the
emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …
emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …
Critical infrastructure protection: Requirements and challenges for the 21st century
C Alcaraz, S Zeadally - International journal of critical infrastructure …, 2015 - Elsevier
Critical infrastructures play a vital role in supporting modern society. The reliability,
performance, continuous operation, safety, maintenance and protection of critical …
performance, continuous operation, safety, maintenance and protection of critical …
[图书][B] The state of the art in intrusion prevention and detection
ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …
entities that enter or intrude within the network perimeter, which could commonly be termed …
[HTML][HTML] Cyber attack taxonomy for digital environment in nuclear power plants
With the development of digital instrumentation and control (I&C) devices, cyber security at
nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's …
nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's …
A probabilistic analysis of cyber risks
ME Paté-Cornell, MA Kuypers - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Cyber risk affects all organizations. Cyber risk management has generally been based on
the heuristics and the availability of protective tools, such as firewalls and passwords. Only …
the heuristics and the availability of protective tools, such as firewalls and passwords. Only …
A collaborative information sharing framework for community cyber security
W Zhao, G White - 2012 IEEE Conference on Technologies for …, 2012 - ieeexplore.ieee.org
As the reliance of communities on critical cyber infrastructures is growing, they are becoming
more vulnerable to cyber attacks. The Community Cyber Security Maturity Model (CCSMM) …
more vulnerable to cyber attacks. The Community Cyber Security Maturity Model (CCSMM) …
Cyber defense capability model: A foundation taxonomy
F Kolini, L Janczewski - 2015 - aisel.aisnet.org
Cyber attacks have significantly increased over the last few years, where the attackers are
highly skilled, more organized and supported by other powerful actors to devise attacks …
highly skilled, more organized and supported by other powerful actors to devise attacks …
DDoS attacks and impacts on various cloud computing components
Cloud computing is the subject of the era and is the current keen domain of interest of
organizations. Therefore, the future outlook of this technology is optimisticly considered to be …
organizations. Therefore, the future outlook of this technology is optimisticly considered to be …
Ontology for systems development
N Hallberg, E Jungert, S Pilemalm - International journal of software …, 2014 - World Scientific
Software-intensive information systems have a major impact on our lives, both privately and
professionally. Development of these systems is a complex activity that requires the …
professionally. Development of these systems is a complex activity that requires the …
Topological data analysis for enhancing embedded analytics for enterprise cyber log analysis and forensics
Forensic analysis of logs is one responsibility of an enterprise cyber defense team;
inherently, this is a big data task with thousands of events possibly logged in minutes of …
inherently, this is a big data task with thousands of events possibly logged in minutes of …