Cybercompetitions: A survey of competitions, tools, and systems to support cybersecurity education

T Balon, I Baggili - Education and Information Technologies, 2023 - Springer
Over the last decade, industry and academia have worked towards raising students'
interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity …

Risk-based access control model: A systematic literature review

HF Atlam, MA Azad, MO Alassafi, AA Alshdadi… - Future Internet, 2020 - mdpi.com
Most current access control models are rigid, as they are designed using static policies that
always give the same outcome in different circumstances. In addition, they cannot adapt to …

Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator

L Golightly, P Modesti, V Chang - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Network emulation offers a flexible solution for network deployment and operations,
leveraging software to consolidate all nodes in a topology and utilizing the resources of a …

Assessment of hypervisor vulnerabilities

A Thongthua, S Ngamsuriyaroj - 2016 International conference …, 2016 - ieeexplore.ieee.org
Hypervisors are the main components for managing virtual machines on cloud computing
systems. Thus, the security of hypervisors is very crucial as the whole system could be …

A flexible trust manager for remote attestation in heterogeneous critical infrastructures

E Bravi, DG Berbecaru, A Lioy - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Nowadays, critical infrastructures are managed through paradigms such as cloud/fog/edge
computing and Network Function Virtualization (NFV), providing advantages as flexibility …

Incident duration model on urban freeways based on classification and regression tree

Z Xiaoqiang, L Ruimin, Y Xinxin - 2009 Second International …, 2009 - ieeexplore.ieee.org
Effective incident management requires accurate prediction of incident duration. In this
paper, classification and regression tree (CART) is employed to model the incident duration …

[HTML][HTML] Behind the last line of defense: Surviving soc faults and intrusions

IP Gouveia, M Völp, P Esteves-Verissimo - Computers & Security, 2022 - Elsevier
Today, leveraging the enormous modular power, diversity and flexibility of manycore
systems-on-a-chip (SoCs) requires careful orchestration of complex and heterogeneous …

Multiple hardware-separated computer operating systems within a single processor computer system to prevent cross-contamination between systems

O Surdu - US Patent 10,146,940, 2018 - Google Patents
Using a single processor, separate and independent hardware-enforced operating systems
(OS's) are created in a computer, each OS inaccessible by another OS so that malware …

Survivability analysis of VM-based intrusion tolerant systems

J Zheng, H Okamura, T Dohi - IEICE TRANSACTIONS on …, 2015 - search.ieice.org
Survivability is the capability of a system to provide its services in a timely manner even after
intrusion and compromise occur. In this paper, we focus on the quantitative analysis of …

[PDF][PDF] Il cloud computing in ambito sanitario tra security e privacy

M Farina - 2019 - shopdata.giuffre.it
Questo importante saggio affronta, con grande rigore, il tema del rapporto tra sanità e
digitalizzazione, che rappresenta una delle sfide principali per la garanzia dell'unico diritto …