Survey of attack projection, prediction, and forecasting in cyber security

M Husák, J Komárková, E Bou-Harb… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …

A systematic review of cyber-resilience assessment frameworks

DAS Estay, R Sahay, MB Barfod, CD Jensen - Computers & security, 2020 - Elsevier
Cyber-attacks are regarded as one of the most serious threats to businesses worldwide.
Organizations dependent on Information Technology (IT) derive value not only from …

H state estimation for memristive neural networks with randomly occurring DoS attacks

H Tao, H Tan, Q Chen, H Liu, J Hu - Systems Science & Control …, 2022 - Taylor & Francis
This study deals with the problem of the H∞ state estimation for discrete-time memristive
neural networks with time-varying delays, where the output is subject to randomly occurring …

Big data for cybersecurity: Vulnerability disclosure trends and dependencies

MJ Tang, M Alazab, Y Luo - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
Complex Big Data systems in modern organisations are progressively becoming attack
targets by existing and emerging threat agents. Elaborate and specialised attacks will …

Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method

SA Foroutan, FR Salmasi - IET Cyber‐Physical Systems …, 2017 - Wiley Online Library
One of the most addressed attacks in power networks is false data injection (FDI) which
affects monitoring, fault detection, and state estimation integrity by tampering measurement …

Modeling and predicting cyber hacking breaches

M Xu, KM Schweitzer, RM Bateman… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Analyzing cyber incident data sets is an important method for deepening our understanding
of the evolution of the threat situation. This is a relatively new research topic, and many …

An SDN-enabled pseudo-honeypot strategy for distributed denial of service attacks in industrial Internet of Things

M Du, K Wang - IEEE Transactions on Industrial Informatics, 2019 - ieeexplore.ieee.org
Leveraging high-performance software-defined networks (SDNs) to manage industrial
Internet of Things (IIoT) devices has become a promising trend; the SDN is expected to be …

A deep learning framework for predicting cyber attacks rates

X Fang, M Xu, S Xu, P Zhao - EURASIP Journal on Information security, 2019 - Springer
Like how useful weather forecasting is, the capability of forecasting or predicting cyber
threats can never be overestimated. Previous investigations show that cyber attack data …

Stram: Measuring the trustworthiness of computer-based systems

JH Cho, S Xu, PM Hurley, M Mackay… - ACM Computing …, 2019 - dl.acm.org
Various system metrics have been proposed for measuring the quality of computer-based
systems, such as dependability and security metrics for estimating their performance and …

Masking transmission line outages via false data injection attacks

X Liu, Z Li, X Liu, Z Li - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
Today's power systems become more prone to cyber-attacks due to the high integration of
information technologies. In this paper, we demonstrate that the outages of some lines can …