Microservice security: a systematic literature review
Microservices is an emerging paradigm for developing distributed systems. With their
widespread adoption, more and more work investigated the relation between microservices …
widespread adoption, more and more work investigated the relation between microservices …
Key requirements for the detection and sharing of behavioral indicators of compromise
A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Electronics, 2022 - mdpi.com
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …
These indicators are the main source of tactical cyber intelligence most organizations benefit …
Cyber Security for Cyber-Physical Systems in Critical Infrastructures: Bibliometrics Analysis and Future Directions
M Pourmadadkar, M Lezzi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Cyber-physical systems are being increasingly connected to the physical world, making
them attractive targets for cyber-attacks. The consequences of CPS cyber threats are even …
them attractive targets for cyber-attacks. The consequences of CPS cyber threats are even …
[PDF][PDF] A reference architecture model for big data systems in the finance sector
J Soldatos, E Troiano, P Kranas… - Big Data and Artificial …, 2022 - library.oapen.org
1.1 Background In recent years, banks and other financial institutions are accelerating their
digital transformation. As part of this transformation, financial organizations produce …
digital transformation. As part of this transformation, financial organizations produce …
Security enhancements and flaws of emerging communication technologies
D Berardi - 2022 - amsdottorato.unibo.it
The multi-faced evolution of network technologies ranges from big data centers to
specialized network infrastructures and protocols for mission-critical operations. For …
specialized network infrastructures and protocols for mission-critical operations. For …
Modeling of advanced threat actors: characterization, categorization and detection
A Villalón Huerta - 2023 - riunet.upv.es
[EN] Information and its related technologies are a critical asset to protect for people,
organizations and even whole countries. Our dependency on information technologies …
organizations and even whole countries. Our dependency on information technologies …
Identity Theft Prediction Model using Historical Data and Supervised Machine Learning: Design Science Research Study
C Mitchell - 2023 - search.proquest.com
With the growth of online banking, there has been a rise in identity theft and other
cybercrimes. What is missing in the current published literature is how historical identity theft …
cybercrimes. What is missing in the current published literature is how historical identity theft …
[PDF][PDF] Key Requirements for the Detection and Sharing of Behavioral Indicators of Compromise. Electronics 2022, 11, 416
A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - 2022 - pdfs.semanticscholar.org
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …
These indicators are the main source of tactical cyber intelligence most organizations benefit …