Current cyber-defense trends in industrial control systems

JE Rubio, C Alcaraz, R Roman, J Lopez - Computers & Security, 2019 - Elsevier
Abstract Advanced Persistent Threats (APTs) have become a serious hazard for any critical
infrastructure, as a single solution to protect all industrial assets from these complex attacks …

Detecting peering infrastructure outages in the wild

V Giotsas, C Dietzel, G Smaragdakis… - Proceedings of the …, 2017 - dl.acm.org
Peering infrastructures, namely, colocation facilities and Internet exchange points, are
located in every major city, have hundreds of network members, and support hundreds of …

[图书][B] Cybersecurity of industrial systems

JM Flaus - 2019 - books.google.com
How to manage the cybersecurity of industrial systems is a crucial question. To implement
relevant solutions, the industrial manager must have a clear understanding of IT systems, of …

[PDF][PDF] Analysis of Intrusion Detection Systems in Industrial Ecosystems.

JE Rubio, C Alcaraz, R Roman, J Lopez - SECRYPT, 2017 - scitepress.org
For an effective protection of all the elements of an industrial ecosystem against threats, it is
necessary to understand the true scope of existing mechanisms capable of detecting …

Impact of a DDoS attack on computer systems: An approach based on an attack tree model

R Maciel, J Araujo, J Dantas, C Melo… - 2018 Annual IEEE …, 2018 - ieeexplore.ieee.org
Attacks that deny access to a service provider can occur anytime, anywhere, and most
usually occur with little or no warning. Many small and midsize companies are not prepared …

Ontology-based model for automotive security verification and validation

AM Shaaban, C Schmittner, T Gruber… - Proceedings of the 21st …, 2019 - dl.acm.org
Modern automobiles are considered semi-autonomous vehicles regarding new adaptive
technologies. New cars consist of a vast number of electronic units for managing and …

[图书][B] Cybersécurité des systèmes industriels

JM Flaus - 2019 - books.google.com
La maîtrise de la cybersécurité des systèmes industriels est une question cruciale. Pour
mettre en oeuvre des solutions pertinentes, le responsable industriel doit connaître le …

So long, and thanks for only using readily available scripts

H Holm, T Sommestad - Information & Computer Security, 2017 - emerald.com
Purpose It is often argued that the increased automation and availability of offensive cyber
tools has decreased the skill and knowledge required by attackers. Some say that all it takes …

[PDF][PDF] Identification of IT security and legal requirements regarding cloud services

C Christmann, J Falkner, A Horch… - … Conference on Cloud …, 2015 - academia.edu
The adoption of cloud computing holds tremendous potential for small and medium-sized
enterprises (SMEs) as it enables them to reduce costs as well as improve flexibility and …

Impact assessment of multi-threats in computer systems using attack tree modeling

R Maciel, J Araujo, C Melo, J Dantas… - … on Systems, Man, and …, 2018 - ieeexplore.ieee.org
Attacks that deny access to a service provider can occur anytime, anywhere, and most
usually occur with little or no warning. Many small and midsize companies are not prepared …