A survey on systems security metrics

M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …

A comprehensive approach for network attack forecasting

M GhasemiGol, A Ghaemi-Bafghi, H Takabi - computers & security, 2016 - Elsevier
Forecasting future attacks is a big challenge for network administrators because future is
generally unknown. Nevertheless, some information about the future can help us make …

A Systematic Mapping Study on Intrusion Response Systems

A Rezapour, M GhasemiGol, D Takabi - IEEE Access, 2024 - ieeexplore.ieee.org
With the increasing frequency and sophistication of network attacks, network administrators
are facing tremendous challenges in making fast and optimum decisions during critical …

A model-based validated autonomic approach to self-protect computing systems

Q Chen, S Abdelwahed, A Erradi - IEEE Internet of things …, 2014 - ieeexplore.ieee.org
This paper introduces an autonomic model-based cyber security management approach for
the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting …

Towards automated incident handling: How to select an appropriate response against a network-based attack?

S Ossenbühl, J Steinberger… - 2015 Ninth International …, 2015 - ieeexplore.ieee.org
The increasing amount of network-based attacks evolved to one of the top concerns
responsible for network infrastructure and service outages. In order to counteract these …

Dynamic countermeasures selection for multi-path attacks

F Li, Y Li, S Leng, Y Guo, K Geng, Z Wang, L Fang - Computers & Security, 2020 - Elsevier
Multi-step attacks have been widely adopted by attackers, resulting in privacy leakage.
Although many cost-sensitive approaches have been proposed to respond to the multi-step …

ARITO: Cyber-attack response system using accurate risk impact tolerance

A Shameli-Sendi, M Dagenais - International journal of information …, 2014 - Springer
We propose a novel approach for automated intrusion response systems to assess the value
of the loss that could be suffered by a compromised resource. A risk assessment component …

Optimal configuration of intrusion detection systems

B Mishra, I Smirnova - Information Technology and Management, 2021 - Springer
An important requirement of an intrusion detection system (IDS) is that it be effective and
efficient; that is, it should detect a large percentage of intrusions, while still keeping the false …

Toward realizing self-protecting healthcare information systems: Design and security challenges

Q Chen - Advances in Computers, 2019 - Elsevier
This book chapter reviews the history of Healthcare Information Systems (HISs), discusses
recent cyber security threats affecting HISs, and then introduces the autonomic computing …

Selection of Pareto-efficient response plans based on financial and operational assessments

A Motzek, G Gonzalez-Granadillo, H Debar… - EURASIP Journal on …, 2017 - Springer
Finding adequate responses to ongoing attacks on ICT systems is a pertinacious problem
and requires assessments from different perpendicular viewpoints. However, current …