An autonomous cybersecurity framework for next-generation digital service chains

M Repetto, D Striccoli, G Piro, A Carrega… - Journal of Network and …, 2021 - Springer
Today, the digital economy is pushing new business models, based on the creation of value
chains for data processing, through the interconnection of processes, products, services …

[HTML][HTML] Adaptive monitoring, detection, and response for agile digital service chains

M Repetto - Computers & Security, 2023 - Elsevier
Modern business is increasingly adopting fully-digital workflows composed of
complementary services (in terms of infrastructures, software, networks, data and devices) …

An architecture to manage security operations for digital service chains

M Repetto, A Carrega, R Rapuzzi - Future Generation Computer Systems, 2021 - Elsevier
Evolving business models are progressively pushing for increasing digitalization of existing
and novel processes. The ICT industry is already addressing this need by massive …

Building security awareness of interdependent services, business processes, and systems in cyberspace

M Amanowicz, M Kamola - Electronics, 2022 - mdpi.com
Protection against a growing number of increasingly sophisticated and complex
cyberattacks requires the real-time acquisition of up-to-date information on identified threats …

Elegant: Security of critical infrastructures with digital twins

B Sousa, M Arieiro, V Pereira, J Correia… - IEEE …, 2021 - ieeexplore.ieee.org
The past years have witnessed an increasing interest and concern regarding the
development of security monitoring and management mechanisms for Critical …

[PDF][PDF] Automating security risk and requirements management for cyber-physical systems

G Hansch - 2020 - ediss.uni-goettingen.de
Abstract Cyber-Physical Systems enable various modern use cases and business models
such as connected vehicles, the Smart (power) Grid, or the Industrial Internet of Things. Their …

Cybersecurity of Digital Service Chains: Challenges, Methodologies, and Tools

J Kołodziej, M Repetto, A Duzha - 2022 - library.oapen.org
This open access book presents the main scientific results from the H2020 GUARD project.
The GUARD project aims at filling the current technological gap between software …

[PDF][PDF] Methodologies, Requirements, and Challenges of Cybersecurity Frameworks: A Review

AD Khaleefah, HM Al-Mashhadi - Iraqi Journal of Science, 2024 - iasj.net
As a result of the emergence of new business paradigms and the development of the digital
economy, the interaction between operations, services, things, and software across …

Intrusion detection and prevention

DPF Möller - Guide to Cybersecurity in Digital Transformation …, 2023 - Springer
Intrusion detection and prevention are security measures used to detect and prevent
cybersecurity risks to computer systems, networks, infrastructure resources, and others …

Selection of countermeasures against network attacks based on dynamical calculation of security metrics

I Kotenko, E Doynikova - The Journal of Defense Modeling …, 2018 - journals.sagepub.com
This paper considers the issue of countermeasure selection for ongoing computer network
attacks. We outline several challenges that should be overcome for the efficient response …