Self-adaptive software: Landscape and research challenges

M Salehie, L Tahvildari - ACM transactions on autonomous and adaptive …, 2009 - dl.acm.org
Software systems dealing with distributed applications in changing environments normally
require human supervision to continue operation in all conditions. These (re-) configuring …

A survey of formal methods in self-adaptive systems

D Weyns, MU Iftikhar, DG De La Iglesia… - Proceedings of the fifth …, 2012 - dl.acm.org
One major challenge in self-adaptive systems is to assure the required quality properties.
Formal methods provide the means to rigorously specify and reason about the behaviors of …

A testbed for analyzing security of SCADA control systems (TASSCS)

M Mallouhi, Y Al-Nashif, D Cox, T Chadaga… - ISGT 2011, 2011 - ieeexplore.ieee.org
The critical infrastructures of our society are in the process of being modernized. Most
significantly impacted are the industrial control systems through replacement of old …

A systematic survey of self-protecting software systems

E Yuan, N Esfahani, S Malek - ACM Transactions on Autonomous and …, 2014 - dl.acm.org
Self-protecting software systems are a class of autonomic systems capable of detecting and
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …

An efficient flow-based multi-level hybrid intrusion detection system for software-defined networks

M Latah, L Toker - CCF Transactions on Networking, 2020 - Springer
Software-defined networking (SDN) is a novel networking paradigm that provides enhanced
programming abilities, which can be used to solve traditional security challenges on the …

A novel deep hierarchical machine learning approach for identification of known and unknown multiple security attacks in a d2d communications network

SVJ Rani, II Ioannou, P Nagaradjane… - IEEE …, 2023 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) have played a crucial role in identifying cyber threats for
a very long time. Still, their significance has increased significantly with the advent of 5G/6G …

Architecture-based self-protecting software systems

E Yuan, S Malek, B Schmerl, D Garlan… - Proceedings of the 9th …, 2013 - dl.acm.org
Since conventional software security approaches are often manually developed and
statically deployed, they are no longer sufficient against today's sophisticated and evolving …

Oppositional tunicate fuzzy C‐means algorithm and logistic regression for intrusion detection on cloud

P Kanimozhi… - … and computation: practice …, 2022 - Wiley Online Library
Cloud computing is the most popular emerging computational model in information
technology. The data communication security requirement is increased day by day with the …

Stateful intrusion detection for IEC 60870-5-104 SCADA security

Y Yang, K McLaughlin, S Sezer… - 2014 IEEE PES …, 2014 - ieeexplore.ieee.org
Cyber threats in Supervisory Control and Data Acquisition (SCADA) systems have the
potential to render physical damage and jeopardize power system operation, safety and …

Automated structured threat information expression (stix) document generation with privacy preservation

F Sadique, S Cheung, I Vakilinia… - 2018 9th IEEE …, 2018 - ieeexplore.ieee.org
The traditional approach to cybersecurity is struggling to defend against modern, dynamic
and rapidly evolving cyber-attacks. Automated generation of cyber-threat intelligence (CTI) …