A multi-vocal review of security orchestration

C Islam, MA Babar, S Nepal - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Organizations use diverse types of security solutions to prevent cyber-attacks. Multiple
vendors provide security solutions developed using heterogeneous technologies and …

Context-aware security for vehicles and fleets: A survey

D Grimm, M Stang, E Sax - IEEE Access, 2021 - ieeexplore.ieee.org
Vehicles are becoming increasingly intelligent and connected. Interfaces for communication
with the vehicle, such as WiFi and 5G, enable seamless integration into the user's life, but …

A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow

H Wang, Z Chen, J Zhao, X Di, D Liu - Ieee Access, 2018 - ieeexplore.ieee.org
To solve the low attack path quantification degree and complex path finding in the industrial
Internet of Things, a vulnerability assessment method based on attack graph and maximum …

A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions

S Singh, PK Sharma, SY Moon, D Moon… - The Journal of …, 2019 - Springer
Recently in the connected digital world, targeted attack has become one of the most serious
threats to conventional computing systems. Advanced persistent threat (APT) is currently …

[PDF][PDF] 网络安全态势感知综述

龚俭, 臧小东, 苏琪, 胡晓艳, 徐杰 - 软件学报, 2016 - jos.org.cn
随着网络空间安全重要性的不断提高, 网络安全态势感知(network security situation
awareness, 简称NSSA) 的研究与应用正在得到更多的关注. NSSA 实现对网络中各种活动的 …

[HTML][HTML] Semantics-aware detection of targeted attacks: a survey

R Luh, S Marschalek, M Kaiser, H Janicke… - Journal of Computer …, 2017 - Springer
In today's interconnected digital world, targeted attacks have become a serious threat to
conventional computer systems and critical infrastructure alike. Many researchers contribute …

Multi-stage attack detection using contextual information

FJ Aparicio-Navarro, KG Kyriakopoulos… - MILCOM 2018-2018 …, 2018 - ieeexplore.ieee.org
The appearance of new forms of cyber-threats, such as Multi-Stage Attacks (MSAs), creates
new challenges to which Intrusion Detection Systems (IDSs) need to adapt. An MSA is …

Using pattern-of-life as contextual information for anomaly-based intrusion detection systems

FJ Aparicio-Navarro, KG Kyriakopoulos, Y Gong… - IEEE …, 2017 - ieeexplore.ieee.org
As the complexity of cyber-attacks keeps increasing, new robust detection mechanisms
need to be developed. The next generation of Intrusion Detection Systems (IDSs) should be …

TAON: An ontology-based approach to mitigating targeted attacks

R Luh, S Schrittwieser, S Marschalek - Proceedings of the 18th …, 2016 - dl.acm.org
Targeted attacks on IT systems are a rising threat against the confidentiality of sensitive data
and the availability of systems and infrastructures. Planning for the eventuality of a data …

Addressing multi-stage attacks using expert knowledge and contextual information

FJ Aparicio-Navarro, TA Chadza… - … 22nd Conference on …, 2019 - ieeexplore.ieee.org
New challenges in the cyber-threat domain are driven by tactical and meticulously designed
Multi-Stage Attacks (MSAs). Current state-of-the-art (SOTA) Intrusion Detection Systems …