Microservice security: a systematic literature review

D Berardi, S Giallorenzo, J Mauro, A Melis… - PeerJ Computer …, 2022 - peerj.com
Microservices is an emerging paradigm for developing distributed systems. With their
widespread adoption, more and more work investigated the relation between microservices …

Key requirements for the detection and sharing of behavioral indicators of compromise

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Electronics, 2022 - mdpi.com
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …

Cyber Security for Cyber-Physical Systems in Critical Infrastructures: Bibliometrics Analysis and Future Directions

M Pourmadadkar, M Lezzi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Cyber-physical systems are being increasingly connected to the physical world, making
them attractive targets for cyber-attacks. The consequences of CPS cyber threats are even …

[PDF][PDF] A reference architecture model for big data systems in the finance sector

J Soldatos, E Troiano, P Kranas… - Big Data and Artificial …, 2022 - library.oapen.org
1.1 Background In recent years, banks and other financial institutions are accelerating their
digital transformation. As part of this transformation, financial organizations produce …

Security enhancements and flaws of emerging communication technologies

D Berardi - 2022 - amsdottorato.unibo.it
The multi-faced evolution of network technologies ranges from big data centers to
specialized network infrastructures and protocols for mission-critical operations. For …

Modeling of advanced threat actors: characterization, categorization and detection

A Villalón Huerta - 2023 - riunet.upv.es
[EN] Information and its related technologies are a critical asset to protect for people,
organizations and even whole countries. Our dependency on information technologies …

Identity Theft Prediction Model using Historical Data and Supervised Machine Learning: Design Science Research Study

C Mitchell - 2023 - search.proquest.com
With the growth of online banking, there has been a rise in identity theft and other
cybercrimes. What is missing in the current published literature is how historical identity theft …

[PDF][PDF] Key Requirements for the Detection and Sharing of Behavioral Indicators of Compromise. Electronics 2022, 11, 416

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - 2022 - pdfs.semanticscholar.org
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …