Survey of attack projection, prediction, and forecasting in cyber security
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …
Four main tasks are discussed first, attack projection and intention recognition, in which …
A systematic review of cyber-resilience assessment frameworks
Cyber-attacks are regarded as one of the most serious threats to businesses worldwide.
Organizations dependent on Information Technology (IT) derive value not only from …
Organizations dependent on Information Technology (IT) derive value not only from …
H∞ state estimation for memristive neural networks with randomly occurring DoS attacks
This study deals with the problem of the H∞ state estimation for discrete-time memristive
neural networks with time-varying delays, where the output is subject to randomly occurring …
neural networks with time-varying delays, where the output is subject to randomly occurring …
Big data for cybersecurity: Vulnerability disclosure trends and dependencies
MJ Tang, M Alazab, Y Luo - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
Complex Big Data systems in modern organisations are progressively becoming attack
targets by existing and emerging threat agents. Elaborate and specialised attacks will …
targets by existing and emerging threat agents. Elaborate and specialised attacks will …
Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method
SA Foroutan, FR Salmasi - IET Cyber‐Physical Systems …, 2017 - Wiley Online Library
One of the most addressed attacks in power networks is false data injection (FDI) which
affects monitoring, fault detection, and state estimation integrity by tampering measurement …
affects monitoring, fault detection, and state estimation integrity by tampering measurement …
Modeling and predicting cyber hacking breaches
M Xu, KM Schweitzer, RM Bateman… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Analyzing cyber incident data sets is an important method for deepening our understanding
of the evolution of the threat situation. This is a relatively new research topic, and many …
of the evolution of the threat situation. This is a relatively new research topic, and many …
An SDN-enabled pseudo-honeypot strategy for distributed denial of service attacks in industrial Internet of Things
Leveraging high-performance software-defined networks (SDNs) to manage industrial
Internet of Things (IIoT) devices has become a promising trend; the SDN is expected to be …
Internet of Things (IIoT) devices has become a promising trend; the SDN is expected to be …
A deep learning framework for predicting cyber attacks rates
Like how useful weather forecasting is, the capability of forecasting or predicting cyber
threats can never be overestimated. Previous investigations show that cyber attack data …
threats can never be overestimated. Previous investigations show that cyber attack data …
Stram: Measuring the trustworthiness of computer-based systems
Various system metrics have been proposed for measuring the quality of computer-based
systems, such as dependability and security metrics for estimating their performance and …
systems, such as dependability and security metrics for estimating their performance and …
Masking transmission line outages via false data injection attacks
Today's power systems become more prone to cyber-attacks due to the high integration of
information technologies. In this paper, we demonstrate that the outages of some lines can …
information technologies. In this paper, we demonstrate that the outages of some lines can …