Tutorial and critical analysis of phishing websites methods

RM Mohammad, F Thabtah, L McCluskey - Computer Science Review, 2015 - Elsevier
The Internet has become an essential component of our everyday social and financial
activities. Internet is not important for individual users only but also for organizations …

Predicting phishing websites based on self-structuring neural network

RM Mohammad, F Thabtah, L McCluskey - Neural Computing and …, 2014 - Springer
Internet has become an essential component of our everyday social and financial activities.
Nevertheless, internet users may be vulnerable to different types of web threats, which may …

Decision support for cybersecurity risk planning

LP Rees, JK Deane, TR Rakes, WH Baker - Decision Support Systems, 2011 - Elsevier
Security countermeasures help ensure the confidentiality, availability, and integrity of
information systems by preventing or mitigating asset losses from Cybersecurity attacks. Due …

[图书][B] Real life applications of soft computing

A Shukla, R Tiwari, R Kala - 2010 - books.google.com
Rapid advancements in the application of soft computing tools and techniques have proven
valuable in the development of highly scalable systems. Although many resources on the …

The IoT security gap: a look down into the valley between threat models and their implementation

P Aufner - International Journal of Information Security, 2020 - Springer
We claim to have identified gaps between threat modeling frameworks, threat model use in
IoT security research and attacks that may be missed by current research. While security …

[PDF][PDF] Threat modelling methodologies: a survey

S Hussain, A Kamal, S Ahmad, G Rasool, S Iqbal - Sci. Int.(Lahore), 2014 - academia.edu
The security of software systems can be broadly divided into two categories namely external
security and internal security. The internal security of software systems is the main issue for …

Security analysis of OpenDaylight, ONOS, Rosemary and Ryu SDN controllers

RK Arbettu, R Khondoker, K Bayarou… - … network strategy and …, 2016 - ieeexplore.ieee.org
There is an immense expectation on Software-Defined Networking (SDN) in industry as a
novel approach towards potentially replacing conventional network management and …

Herbal plants in the traditional medicine of Bahrain

JA Abbas, AA El-Oqlah, AM Mahasneh - Economic Botany, 1992 - Springer
Plant samples collected in Bahrain and data reported in the literature indicate the flora of
Bahrain to contain 52 species (49 genera; 20 families) of medicinal interest. Of these plant …

Structured system threat modeling and mitigation analysis for industrial automation systems

R Schlegel, S Obermeier… - 2015 IEEE 13th …, 2015 - ieeexplore.ieee.org
Industrial control systems are an important part of critical infrastructures and their
uninterrupted operation is important for many aspects of society. In recent years these …

Fuzzy logic approach for threat prioritization in agile security framework using DREAD model

A Singhal, H Banati - arXiv preprint arXiv:1312.6836, 2013 - arxiv.org
For a qualitative system sound security practices must be a crucial part throughout the entire
software lifecycle. Furthermore, agile software development has paved the way for …