A survey of intrusion detection in Internet of Things

BB Zarpelão, RS Miani, CT Kawakani… - Journal of Network and …, 2017 - Elsevier
Abstract Internet of Things (IoT) is a new paradigm that integrates the Internet and physical
objects belonging to different domains such as home automation, industrial process, human …

[HTML][HTML] A review of cyber security risk assessment methods for SCADA systems

Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones… - Computers & …, 2016 - Elsevier
This paper reviews the state of the art in cyber security risk assessment of Supervisory
Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four …

Systems for network risk assessment including processing of user access rights associated with a network of devices

M Seiver, S Cohen - US Patent 9,648,036, 2017 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on computer
storage media, for network risk assessment. One of the methods includes obtaining infor …

Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid

A Ashok, M Govindarasu, J Wang - Proceedings of the IEEE, 2017 - ieeexplore.ieee.org
Cybersecurity and resiliency of wide-area monitoring, protection, and control (WAMPAC)
applications is critically important to ensure secure, reliable, and economical operation of …

A survey on systems security metrics

M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …

A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud

S Sharma, A Kaul - Vehicular communications, 2018 - Elsevier
Vehicular ad-hoc Network (VANET) is an emerging type of Mobile ad-hoc Networks
(MANETs) with excellent applications in the intelligent traffic system. Applications in VANETs …

[HTML][HTML] A comprehensive model of information security factors for decision-makers

R Diesch, M Pfaff, H Krcmar - Computers & Security, 2020 - Elsevier
Decision-making in the context of organizational information security is highly dependent on
various information. For information security managers, not only relevant information has to …

SoK: Quantifying cyber risk

DW Woods, R Böhme - 2021 IEEE Symposium on Security and …, 2021 - ieeexplore.ieee.org
This paper introduces a causal model inspired by structural equation modeling that explains
cyber risk outcomes in terms of latent factors measured using reflexive indicators. First, we …

Locking the sky: a survey on IaaS cloud security

LM Vaquero, L Rodero-Merino, D Morán - Computing, 2011 - Springer
Cloud computing is expected to become a common solution for deploying applications
thanks to its capacity to leverage developers from infrastructure management tasks, thus …

Intrusion detection systems in RPL-based 6LoWPAN: A systematic literature review

AM Pasikhani, JA Clark, P Gope… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
Drastic reduction in the manufacturing cost of sensors and actuators has resulted in
considerable growth in the number of smart objects. The so-called Internet of Things (IoT) …