A security architecture for 5G networks

G Arfaoui, P Bisson, R Blom, R Borgaonkar… - IEEE …, 2018 - ieeexplore.ieee.org
5G networks will provide opportunities for the creation of new services, for new business
models, and for new players to enter the mobile market. The networks will support efficient …

A tool for monitoring and maintaining system trustworthiness at runtime

A Goldsteen, M Moffie, T Bandyszak… - 2015 - eprints.soton.ac.uk
Trustworthiness of software systems is a key factor in their acceptance and effectiveness.
This is especially the case for cyber-physical systems, where incorrect or even sub-optimal …

Regulatory compliance modelling using risk management techniques

S Taylor, M Surridge, B Pickering - 2021 IEEE World AI IoT …, 2021 - ieeexplore.ieee.org
We describe a novel approach to regulatory compliance decision support that leverages an
asset-based cyber security risk management approach following ISO 27005, and illustrate …

[图书][B] Trustworthy cyber-physical systems

G Mohammadi - 2019 - Springer
In the era of cyber-physical systems (CPS), almost all activities of our daily life are supported
by a multitude of heterogeneous, loosely coupled systems communicating over the Internet …

Trust modelling in 5G mobile networks

M Surridge, G Correndo, K Meacham, J Papay… - Proceedings of the …, 2018 - dl.acm.org
5G technologies will change the business landscape for mobile network operation. The use
of virtualization through SDN, NFV and Cloud computing offer significant savings of CAPEX …

Urgency in cybersecurity risk management: toward a solid theory

ZÁ Mann - 2024 IEEE 37th Computer Security Foundations …, 2024 - computer.org
IT systems are exposed to a rapidly changing landscape of serious security risks. Given the
limited resources available to an organization, it is becoming more and more important to …

Resilience of the Internet of Things (IoT) from an Information Assurance (IA) perspective

R Rogers, E Apeh… - 2016 10th International …, 2016 - ieeexplore.ieee.org
Internet infrastructure developments and the rise of the IoT Socio-Technical Systems (STS)
have frequently generated more unsecure protocols to facilitate the rapid …

Uncertainty Theories for Real-Time Systems

T Bandyszak, T Weyer, M Daun - Handbook of Real-Time Computing, 2022 - Springer
Real-time systems are typically reactive embedded software-intensive systems that are part
of a larger technical system such as a vehicle or an airplane. Real-time systems perform …

[PDF][PDF] Self-disclosure in Social Media: An Opportunity for Self-Adaptive Systems.

NED Ferreyra, J Schäwel - REFSQ Workshops, 2016 - researchgate.net
Users of Social Network Sites (SNSs) spend considerable amounts of hours per day
exchanging (consuming or sharing) information and using services provided by such …

Problem-based Derivation of Trustworthiness Requirements from Users' Trust Concerns

NG Mohammadi, N Ulfat-Bunyadi… - 2018 16th Annual …, 2018 - ieeexplore.ieee.org
The trustworthiness of cyber-physical systems (CPS) that support complex collaborative
business processes is an emergent property. New technologies like cloud computing bring …