Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

Multicriteria decision and machine learning algorithms for component security evaluation: library‐based overview

J Zhang, S Nazir, A Huang… - Security and …, 2020 - Wiley Online Library
Components are the significant part of a system which plays an important role in the
functionality of the system. Components are the reusable part of a system which are already …

Shielding IoT against cyber‐attacks: an event‐based approach using SIEM

D Diaz Lopez, M Blanco Uribe… - Wireless …, 2018 - Wiley Online Library
Due to the growth of IoT (Internet of Things) devices in different industries and markets in
recent years and considering the currently insufficient protection for these devices, a security …

Анализ методов корреляции событий безопасности в SIEM-системах. Часть 1.

АВ Федорченко, ДС Левшун… - Информатика и …, 2016 - proceedings.spiiras.nw.ru
Аннотация Статья посвящена анализу методов корреляции событий безопасности в
системах управления информацией и событиями безопасности (SIEM-системах) …

Convolution Neural Network‐Based Higher Accurate Intrusion Identification System for the Network Security and Communication

Z Gu, S Nazir, C Hong, S Khan - Security and Communication …, 2020 - Wiley Online Library
With the development of communication systems, information securities remain one of the
main concerns for the last few years. The smart devices are connected to communicate …

[HTML][HTML] Ensuring SDN Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes …

I Kotenko, I Saenko, A Privalov, O Lauta - Big Data and Cognitive …, 2023 - mdpi.com
The article proposes an approach to ensuring the functioning of Software-Defined Networks
(SDN) in cyber attack conditions based on the analytical modeling of cyber attacks using the …

[HTML][HTML] Анализ моделей и методик, используемых для атрибуции нарушителей кибербезопасности при реализации целевых атак

И Котенко, СС Хмыров - Вопросы кибербезопасности, 2022 - cyberleninka.ru
Цель работы: анализ моделей и методик, используемых для атрибуции нарушителей
кибербезопасности в интересах построения перспективной системы атрибуции при …

Method and apparatus for data security analysis of data flows

MM Linde, DJ Kim, E Wells - US Patent 10,693,903, 2020 - Google Patents
A method and apparatus useful for data risk monitoring and management includes
configuration and analysis of data flows to identify and assess risk and compliance to …

Effective security analysis for combinations of mtd techniques on cloud computing (short paper)

H Alavizadeh, DS Kim, JB Hong… - … Conference on Information …, 2017 - Springer
Abstract Moving Target Defense (MTD) is an emerging security solution based on
continuously changing attack surface thus makes it unpredictable for attackers. Cloud …

Stateful RORI-based countermeasure selection using hypergraphs

G Gonzalez-Granadillo, E Doynikova… - Journal of Information …, 2020 - Elsevier
Cost-sensitive metrics have been widely used during the past years as financial metrics that
quantify the monetary costs and benefits of security investments, assess risks, and select …