Information security and privacy in hospitals: a literature mapping and review of research gaps

S Ahouanmenou, A Van Looy… - Informatics for Health and …, 2023 - Taylor & Francis
Information security and privacy are matters of concern in every industry. The healthcare
sector has lagged in terms of implementing cybersecurity measures. Therefore, hospitals are …

Moving Target Defense‐Based Denial‐of‐Service Mitigation in Cloud Environments: A Survey

M Nguyen, S Debroy - Security and Communication Networks, 2022 - Wiley Online Library
With the increased frequency and intensity of denial‐of‐service (DoS) attacks on critical
cloud‐hosted services, resource adaptation schemes adopted by the cloud service …

Metrics towards measuring cyber agility

JD Mireles, E Ficke, JH Cho… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In cyberspace, evolutionary strategies are commonly used by both attackers and defenders.
For example, an attacker's strategy often changes over the course of time, as new …

Hidden-Markov-model-enabled prediction and visualization of cyber agility in IoT era

E Muhati, DB Rawat - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Cyberthreats are continually evolving and growing in numbers and extreme complexities
with the increasing connectivity of the Internet of Things (IoT). Existing cyber-defense tools …

Specification-driven moving target defense synthesis

MM Islam, Q Duan, E Al-Shaer - Proceedings of the 6th ACM Workshop …, 2019 - dl.acm.org
Cyber agility enables cyber systems to defend proactively against sophisticated attacks by
dynamically changing the system configuration parameters (called mutable parameters) in …

Recommendations for model-driven paradigms for integrated approaches to cyber defense

M Lange, A Kott, N Ben-Asher, W Mees… - arXiv preprint arXiv …, 2017 - arxiv.org
The North Atlantic Treaty Organization (NATO) Exploratory Team meeting," Model-Driven
Paradigms for Integrated Approaches to Cyber Defense," was organized by the NATO …

Adversarial Machine Learning for Inferring Augmented Cyber Agility Prediction

E Muhati, DB Rawat - IEEE INFOCOM 2021-IEEE Conference …, 2021 - ieeexplore.ieee.org
Security analysts conduct continuous evaluations of cyber-defense tools to keep pace with
advanced and persistent threats. Cyber agility has become a critical proactive security …

Cyber fighter associate: A decision support system for cyber agility

C Huber, P McDaniel, SE Brown… - … Annual Conference on …, 2016 - ieeexplore.ieee.org
In the event of a cyber attack it is important for network defenders to make quick, informed
decisions to secure assets. However, the human decision making process is slow and …

Identifying key cyber-physical terrain

B Thompson, R Harang - Proceedings of the 3rd ACM on International …, 2017 - dl.acm.org
The high mobility of Army tactical networks, combined with their close proximity to hostile
actors, elevates the risks associated with short-range network attacks. The connectivity …

Identifying key cyber-physical terrain (extended version)

B Thompson, R Harang - arXiv preprint arXiv:1701.07331, 2017 - arxiv.org
The high mobility of Army tactical networks, combined with their close proximity to hostile
actors, elevates the risks associated with short-range network attacks. The connectivity …