Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

Risk-based access control model: A systematic literature review

HF Atlam, MA Azad, MO Alassafi, AA Alshdadi… - Future Internet, 2020 - mdpi.com
Most current access control models are rigid, as they are designed using static policies that
always give the same outcome in different circumstances. In addition, they cannot adapt to …

Introducing deep learning self-adaptive misuse network intrusion detection systems

D Papamartzivanos, FG Mármol, G Kambourakis - IEEE access, 2019 - ieeexplore.ieee.org
The intrusion detection systems (IDSs) are essential elements when it comes to the
protection of an ICT infrastructure. A misuse IDS is a stable method that can achieve high …

[HTML][HTML] A model for risk-based adaptive security controls

M Calvo, M Beltrán - Computers & Security, 2022 - Elsevier
Security controls and countermeasures have shifted from static desktop-based and
corporate network environments to heterogeneous, distributed and dynamic environments …

Shielding IoT against cyber‐attacks: an event‐based approach using SIEM

D Diaz Lopez, M Blanco Uribe… - Wireless …, 2018 - Wiley Online Library
Due to the growth of IoT (Internet of Things) devices in different industries and markets in
recent years and considering the currently insufficient protection for these devices, a security …

E-Government Cybersecurity Modeling in the Context of Software-Defined Networks

RMA Ujjan, I Taj, SN Brohi - Cybersecurity Measures for E …, 2022 - igi-global.com
Currently, information and communication technologies are going in advance, allowing
more information to be distributed globally via the internet superhighway. While being …

Battling against cyberattacks: Towards pre-standardization of countermeasures

P Nespoli, F Gomez Marmol, J Maestre Vidal - Cluster Computing, 2021 - Springer
Cyberattacks targeting ICT systems are becoming every day more sophisticated and
disruptive. Such malevolent actions are performed by ill-motivated entities (governments …

Interface health and workload between stakeholders in complex capital projects: Assessment, visualization, and interpretation using SNA

E Eray, CT Haas, D Rayside - Journal of Management in …, 2021 - ascelibrary.org
Collaboration, communication, and interactions between project stakeholders have a high
impact on the overall success of complex capital projects. To manage these projects and …

Automated cyber threat sensing and responding: integrating threat intelligence into security-policy-controlled systems

P Amthor, D Fischer, WE Kühnhauser… - Proceedings of the 14th …, 2019 - dl.acm.org
Cyber security management requires fast and cost efficient responses to threat alerts.
Automation of cyber threat sensing and responding is one way to achieve immediate …

Trust, security and privacy in emerging distributed systems

J Abawajy, G Wang, LT Yang, B Javadi - Future generation computer …, 2016 - Elsevier
The rapid development and increasing complexity of computer systems and communication
networks coupled with the proliferation of services and applications in both Internet-based …