Data security and threat modeling for smart city infrastructure

P Wang, A Ali, W Kelly - … conference on cyber security of smart …, 2015 - ieeexplore.ieee.org
Smart city opens up data with a wealth of information that brings innovation and connects
government, industry and citizens. Cyber insecurity, on the other hand has raised concerns …

Detection of anomalies in data for monitoring of security components in the Internet of Things

VA Desnitsky, IV Kotenko… - 2015 XVIII International …, 2015 - ieeexplore.ieee.org
The increasing urgency and expansion of information systems implementing the Internet of
Things (IoT) concept determine the importance of the investigation in the field of protection …

[PDF][PDF] Integrated Repository of Security Information for Network Security Evaluation.

A Fedorchenko, IV Kotenko… - J. Wirel. Mob. Networks …, 2015 - academia.edu
Security evaluation systems usually use various information sources to estimate computer
network security. One of the important tasks in these systems is integration and storage of …

Design of integrated vulnerabilities database for computer networks security analysis

A Fedorchenko, I Kotenko… - 2015 23rd Euromicro …, 2015 - ieeexplore.ieee.org
Integration of existing open vulnerabilities databases allows to increase the probability of
detection of vulnerable software and hardware that are used in computer networks and …

Динамическое оценивание защищенности компьютерных сетей в SIEM-системах

ЕВ Дойникова, ИВ Котенко, АА Чечулин - Безопасность …, 2015 - bit.spels.ru
Аннотация В работе предлагается подход к оцениванию защищенности компьютерных
сетей, ос-нованный на графах атак и предназначенный для систем управления …

Обнаружение аномалий в данных для мониторинга компонентов защиты Интернета вещей

ВА Десницкий, ИВ Котенко, СБ Ногин - … конференция по мягким …, 2015 - elibrary.ru
The increasing urgency and expansion of information systems implementing Internet of
Things (IoT) concept determine the importance of the investigation in the field of protection …

A real-time high dynamic range HD video camera

R Narasimha, U Batur - Proceedings of the IEEE Conference on …, 2015 - cv-foundation.org
Standard cameras suffer from low video quality in high dynamic range scenes. In such
scenes, parts of the video are either too dark or too bright. This is because lighting is very …

Design and verification of protected systems with integrated devices based on expert knowledge

VA Desnitskii, IV Kotenko - Automatic Control and Computer Sciences, 2015 - Springer
The approach to identifying expert knowledge in the field of the information security of
integrated devices for their further use by the developers of integrated devices, including as …

HiSPO: A Novel Threat Analysis and Risk Mitigation Approach to Prevent Cyber Intrusions

SP Wang, W Kelly, X Wang - Journal of The Colloquium for Information …, 2015 - cisse.info
In this paper, we study recent data breaches from both technical and business operation
perspectives and propose an approach that calculates threat factors of information systems …