A survey on systems security metrics
M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …
systematically explored based on the understanding of attack-defense interactions, which …
A comprehensive approach for network attack forecasting
M GhasemiGol, A Ghaemi-Bafghi, H Takabi - computers & security, 2016 - Elsevier
Forecasting future attacks is a big challenge for network administrators because future is
generally unknown. Nevertheless, some information about the future can help us make …
generally unknown. Nevertheless, some information about the future can help us make …
A Systematic Mapping Study on Intrusion Response Systems
A Rezapour, M GhasemiGol, D Takabi - IEEE Access, 2024 - ieeexplore.ieee.org
With the increasing frequency and sophistication of network attacks, network administrators
are facing tremendous challenges in making fast and optimum decisions during critical …
are facing tremendous challenges in making fast and optimum decisions during critical …
A model-based validated autonomic approach to self-protect computing systems
This paper introduces an autonomic model-based cyber security management approach for
the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting …
the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting …
Towards automated incident handling: How to select an appropriate response against a network-based attack?
S Ossenbühl, J Steinberger… - 2015 Ninth International …, 2015 - ieeexplore.ieee.org
The increasing amount of network-based attacks evolved to one of the top concerns
responsible for network infrastructure and service outages. In order to counteract these …
responsible for network infrastructure and service outages. In order to counteract these …
Dynamic countermeasures selection for multi-path attacks
F Li, Y Li, S Leng, Y Guo, K Geng, Z Wang, L Fang - Computers & Security, 2020 - Elsevier
Multi-step attacks have been widely adopted by attackers, resulting in privacy leakage.
Although many cost-sensitive approaches have been proposed to respond to the multi-step …
Although many cost-sensitive approaches have been proposed to respond to the multi-step …
ARITO: Cyber-attack response system using accurate risk impact tolerance
A Shameli-Sendi, M Dagenais - International journal of information …, 2014 - Springer
We propose a novel approach for automated intrusion response systems to assess the value
of the loss that could be suffered by a compromised resource. A risk assessment component …
of the loss that could be suffered by a compromised resource. A risk assessment component …
Optimal configuration of intrusion detection systems
B Mishra, I Smirnova - Information Technology and Management, 2021 - Springer
An important requirement of an intrusion detection system (IDS) is that it be effective and
efficient; that is, it should detect a large percentage of intrusions, while still keeping the false …
efficient; that is, it should detect a large percentage of intrusions, while still keeping the false …
Toward realizing self-protecting healthcare information systems: Design and security challenges
Q Chen - Advances in Computers, 2019 - Elsevier
This book chapter reviews the history of Healthcare Information Systems (HISs), discusses
recent cyber security threats affecting HISs, and then introduces the autonomic computing …
recent cyber security threats affecting HISs, and then introduces the autonomic computing …
Selection of Pareto-efficient response plans based on financial and operational assessments
Finding adequate responses to ongoing attacks on ICT systems is a pertinacious problem
and requires assessments from different perpendicular viewpoints. However, current …
and requires assessments from different perpendicular viewpoints. However, current …