J Zhang, S Nazir, A Huang… - Security and …, 2020 - Wiley Online Library
Components are the significant part of a system which plays an important role in the functionality of the system. Components are the reusable part of a system which are already …
D Diaz Lopez, M Blanco Uribe… - Wireless …, 2018 - Wiley Online Library
Due to the growth of IoT (Internet of Things) devices in different industries and markets in recent years and considering the currently insufficient protection for these devices, a security …
Аннотация Статья посвящена анализу методов корреляции событий безопасности в системах управления информацией и событиями безопасности (SIEM-системах) …
Z Gu, S Nazir, C Hong, S Khan - Security and Communication …, 2020 - Wiley Online Library
With the development of communication systems, information securities remain one of the main concerns for the last few years. The smart devices are connected to communicate …
I Kotenko, I Saenko, A Privalov, O Lauta - Big Data and Cognitive …, 2023 - mdpi.com
The article proposes an approach to ensuring the functioning of Software-Defined Networks (SDN) in cyber attack conditions based on the analytical modeling of cyber attacks using the …
И Котенко, СС Хмыров - Вопросы кибербезопасности, 2022 - cyberleninka.ru
Цель работы: анализ моделей и методик, используемых для атрибуции нарушителей кибербезопасности в интересах построения перспективной системы атрибуции при …
MM Linde, DJ Kim, E Wells - US Patent 10,693,903, 2020 - Google Patents
A method and apparatus useful for data risk monitoring and management includes configuration and analysis of data flows to identify and assess risk and compliance to …
Abstract Moving Target Defense (MTD) is an emerging security solution based on continuously changing attack surface thus makes it unpredictable for attackers. Cloud …
Cost-sensitive metrics have been widely used during the past years as financial metrics that quantify the monetary costs and benefits of security investments, assess risks, and select …