Toward proactive, adaptive defense: A survey on moving target defense

JH Cho, DP Sharma, H Alavizadeh… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …

Artificial intelligence for securing IoT services in edge computing: a survey

Z Xu, W Liu, J Huang, C Yang, J Lu… - Security and …, 2020 - Wiley Online Library
With the explosive growth of data generated by the Internet of Things (IoT) devices, the
traditional cloud computing model by transferring all data to the cloud for processing has …

[HTML][HTML] Dynamic defenses in cyber security: Techniques, methods and challenges

Y Zheng, Z Li, X Xu, Q Zhao - Digital Communications and Networks, 2022 - Elsevier
Driven by the rapid development of the Internet of Things, cloud computing and other
emerging technologies, the connotation of cyberspace is constantly expanding and …

Quantified security is a weak hypothesis: a critical survey of results and assumptions

V Verendel - Proceedings of the 2009 workshop on New security …, 2009 - dl.acm.org
This paper critically surveys previous work on quantitative representation and analysis of
security. Such quantified security has been presented as a general approach to precisely …

Moving target defense: state of the art and characteristics

G Cai, B Wang, W Hu, T Wang - Frontiers of Information Technology & …, 2016 - Springer
Moving target defense (MTD) has emerged as one of the game-changing themes to alter the
asymmetric situation between attacks and defenses in cyber-security. Numerous related …

Attack surface definitions: A systematic literature review

C Theisen, N Munaiah, M Al-Zyoud, JC Carver… - Information and …, 2018 - Elsevier
Abstract Context Michael Howard conceptualized the attack surface of a software system as
a metaphor for risk assessment during the development and maintenance of software. While …

A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces

W Peng, F Li, CT Huang, X Zou - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Due to deep automation, the configuration of many Cloud infrastructures is static and
homogeneous, which, while easing administration, significantly decreases a potential …

[HTML][HTML] ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering

D Zelle, C Plappert, R Rieke, D Scheuermann… - Microprocessors and …, 2022 - Elsevier
Connected smart cars enable new attacks that may have serious consequences. Thus, the
development of new cars must follow a cybersecurity engineering process including a …

Cybersecurity model based on hardening for secure internet of things implementation

A Echeverría, C Cevallos, I Ortiz-Garces, RO Andrade - Applied Sciences, 2021 - mdpi.com
The inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids,
and other smart concepts has driven data-driven decision making by managers and …

Context-as-a-Service Platform: exchange and share context in an IoT ecosystem

A Hassani, A Medvedev, PD Haghighi… - 2018 IEEE …, 2018 - ieeexplore.ieee.org
While the Internet of Things (IoT) is growing at a staggering pace, the demand for context-
driven intelligence will be a fundamental factor for IoT sustainability, growth, interoperability …