A survey and taxonomy of DoS attacks in cloud computing

M Masdari, M Jalali - Security and Communication Networks, 2016 - Wiley Online Library
Abstract Denial‐of‐service (DoS) attacks are one of the major security challenges in the
emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …

Critical infrastructure protection: Requirements and challenges for the 21st century

C Alcaraz, S Zeadally - International journal of critical infrastructure …, 2015 - Elsevier
Critical infrastructures play a vital role in supporting modern society. The reliability,
performance, continuous operation, safety, maintenance and protection of critical …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

[HTML][HTML] Cyber attack taxonomy for digital environment in nuclear power plants

S Kim, G Heo, E Zio, J Shin, J Song - Nuclear Engineering and Technology, 2020 - Elsevier
With the development of digital instrumentation and control (I&C) devices, cyber security at
nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's …

A probabilistic analysis of cyber risks

ME Paté-Cornell, MA Kuypers - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Cyber risk affects all organizations. Cyber risk management has generally been based on
the heuristics and the availability of protective tools, such as firewalls and passwords. Only …

A collaborative information sharing framework for community cyber security

W Zhao, G White - 2012 IEEE Conference on Technologies for …, 2012 - ieeexplore.ieee.org
As the reliance of communities on critical cyber infrastructures is growing, they are becoming
more vulnerable to cyber attacks. The Community Cyber Security Maturity Model (CCSMM) …

Cyber defense capability model: A foundation taxonomy

F Kolini, L Janczewski - 2015 - aisel.aisnet.org
Cyber attacks have significantly increased over the last few years, where the attackers are
highly skilled, more organized and supported by other powerful actors to devise attacks …

DDoS attacks and impacts on various cloud computing components

F Shaar, A Efe - International Journal of Information Security …, 2018 - dergipark.org.tr
Cloud computing is the subject of the era and is the current keen domain of interest of
organizations. Therefore, the future outlook of this technology is optimisticly considered to be …

Ontology for systems development

N Hallberg, E Jungert, S Pilemalm - International journal of software …, 2014 - World Scientific
Software-intensive information systems have a major impact on our lives, both privately and
professionally. Development of these systems is a complex activity that requires the …

Topological data analysis for enhancing embedded analytics for enterprise cyber log analysis and forensics

T Bihl, R Gutierrez, K Bauer, B Boehmke, C Saie - 2020 - aisel.aisnet.org
Forensic analysis of logs is one responsibility of an enterprise cyber defense team;
inherently, this is a big data task with thousands of events possibly logged in minutes of …