A survey of cyber security management in industrial control systems

W Knowles, D Prince, D Hutchison, JFP Disso… - International journal of …, 2015 - Elsevier
Contemporary industrial control systems no longer operate in isolation, but use other
networks (eg, corporate networks and the Internet) to facilitate and improve business …

A survey of information security incident handling in the cloud

NH Ab Rahman, KKR Choo - computers & security, 2015 - Elsevier
Incident handling strategy is one key strategy to mitigate risks to the confidentiality, integrity
and availability (CIA) of organisation assets, as well as minimising loss (eg financial …

A survey on industrial control system digital forensics: challenges, advances and future directions

M Cook, A Marnerides, C Johnson… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Operational Technology (OT) systems have become increasingly interconnected and
automated, consequently resulting in them becoming targets of cyber attacks, with the threat …

A survey on forensics and compliance auditing for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - IEEE Access, 2024 - ieeexplore.ieee.org
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …

On security in publish/subscribe services: A survey

C Esposito, M Ciampi - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Publish/subscribe services have encountered considerable success in the building of
modern large-scale mission-critical systems. Such systems are characterized by several non …

Forensic experts' view of forensic‐ready software systems: A qualitative study

L Daubner, B Buhnova, T Pitner - Journal of Software …, 2024 - Wiley Online Library
Software engineers widely acknowledge the inclusion of security requirements in the early
stages of the development process. However, the need to prepare the software for the failure …

Towards a SCADA forensics architecture

T Wu, JFP Disso, K Jones… - … Symposium for ICS & …, 2013 - scienceopen.com
With the increasing threat of sophisticated attacks on critical infrastructures, it is vital that
forensic investigations take place immediately following a security incident. This paper …

Continuous and transparent user identity verification for secure internet services

A Ceccarelli, L Montecchi, F Brancati… - … on Dependable and …, 2014 - ieeexplore.ieee.org
Session management in distributed Internet services is traditionally based on username and
password, explicit logouts and mechanisms of user session expiration using classic …

Insider threat assessment: A model-based methodology

N Nostro, A Ceccarelli, A Bondavalli… - ACM SIGOPS Operating …, 2014 - dl.acm.org
Security is a major challenge for today's companies, especially ICT ones which manage
large scale cyber-critical systems. Amongst the multitude of attacks and threats to which a …

Enhancing intrusion detection in wireless sensor networks through decision trees

A Garofalo, C Di Sarno, V Formicola - … 2013, Coimbra, Portugal, May 15-16 …, 2013 - Springer
Abstract Wireless Sensor Networks (WSNs) are being increasingly adopted also in very
sensitive applications where it is of paramount importance to ensure that the sensor network …