A security architecture for 5G networks
G Arfaoui, P Bisson, R Blom, R Borgaonkar… - IEEE …, 2018 - ieeexplore.ieee.org
5G networks will provide opportunities for the creation of new services, for new business
models, and for new players to enter the mobile market. The networks will support efficient …
models, and for new players to enter the mobile market. The networks will support efficient …
A tool for monitoring and maintaining system trustworthiness at runtime
A Goldsteen, M Moffie, T Bandyszak… - 2015 - eprints.soton.ac.uk
Trustworthiness of software systems is a key factor in their acceptance and effectiveness.
This is especially the case for cyber-physical systems, where incorrect or even sub-optimal …
This is especially the case for cyber-physical systems, where incorrect or even sub-optimal …
Regulatory compliance modelling using risk management techniques
S Taylor, M Surridge, B Pickering - 2021 IEEE World AI IoT …, 2021 - ieeexplore.ieee.org
We describe a novel approach to regulatory compliance decision support that leverages an
asset-based cyber security risk management approach following ISO 27005, and illustrate …
asset-based cyber security risk management approach following ISO 27005, and illustrate …
[图书][B] Trustworthy cyber-physical systems
G Mohammadi - 2019 - Springer
In the era of cyber-physical systems (CPS), almost all activities of our daily life are supported
by a multitude of heterogeneous, loosely coupled systems communicating over the Internet …
by a multitude of heterogeneous, loosely coupled systems communicating over the Internet …
Trust modelling in 5G mobile networks
M Surridge, G Correndo, K Meacham, J Papay… - Proceedings of the …, 2018 - dl.acm.org
5G technologies will change the business landscape for mobile network operation. The use
of virtualization through SDN, NFV and Cloud computing offer significant savings of CAPEX …
of virtualization through SDN, NFV and Cloud computing offer significant savings of CAPEX …
Urgency in cybersecurity risk management: toward a solid theory
ZÁ Mann - 2024 IEEE 37th Computer Security Foundations …, 2024 - computer.org
IT systems are exposed to a rapidly changing landscape of serious security risks. Given the
limited resources available to an organization, it is becoming more and more important to …
limited resources available to an organization, it is becoming more and more important to …
Resilience of the Internet of Things (IoT) from an Information Assurance (IA) perspective
R Rogers, E Apeh… - 2016 10th International …, 2016 - ieeexplore.ieee.org
Internet infrastructure developments and the rise of the IoT Socio-Technical Systems (STS)
have frequently generated more unsecure protocols to facilitate the rapid …
have frequently generated more unsecure protocols to facilitate the rapid …
Uncertainty Theories for Real-Time Systems
Real-time systems are typically reactive embedded software-intensive systems that are part
of a larger technical system such as a vehicle or an airplane. Real-time systems perform …
of a larger technical system such as a vehicle or an airplane. Real-time systems perform …
[PDF][PDF] Self-disclosure in Social Media: An Opportunity for Self-Adaptive Systems.
NED Ferreyra, J Schäwel - REFSQ Workshops, 2016 - researchgate.net
Users of Social Network Sites (SNSs) spend considerable amounts of hours per day
exchanging (consuming or sharing) information and using services provided by such …
exchanging (consuming or sharing) information and using services provided by such …
Problem-based Derivation of Trustworthiness Requirements from Users' Trust Concerns
NG Mohammadi, N Ulfat-Bunyadi… - 2018 16th Annual …, 2018 - ieeexplore.ieee.org
The trustworthiness of cyber-physical systems (CPS) that support complex collaborative
business processes is an emergent property. New technologies like cloud computing bring …
business processes is an emergent property. New technologies like cloud computing bring …