U Lindqvist, E Jonsson - … on Security and Privacy (Cat. No …, 1997 - ieeexplore.ieee.org
This paper presents a classification of intrusions with respect to the technique as well the result. The taxonomy is intended to be a step on the road to an established taxonomy of …
E Jonsson, T Olovsson - IEEE Transactions on Software …, 1997 - ieeexplore.ieee.org
The paper is based on a conceptual framework in which security can be split into two generic types of characteristics, behavioral and preventive. Here, preventive security …
This paper proposes a novel approach to help computing system administrators in monitoring the security of their systems. This approach is based on modeling the system as …
E Jonsson - Proceedings of the 1998 workshop on New security …, 1998 - dl.acm.org
This paper deals with the problem of interpreting security and dependability in such a way that they can be incorporated into the same framework. This calls for a modified …
YS Kim, MK Choi, SM Han, C Lee, PH Seong - Annals of Nuclear Energy, 2020 - Elsevier
The cyber security of NPPs recently has become a major issue, and a utility in Korea is requested to follow cyber security controls and to perform cyber security risk management …
E Jonsson, L Pirzadeh - 2011 Third International Workshop on …, 2011 - ieeexplore.ieee.org
There exists a large number of suggestions for how to measure security, with different goals and objectives. The application areas range from business management and organizational …
X Wang, R Ma, B Li, D Tian, X Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Vulnerability discovery models (VDMs) have recently been proposed to estimate the cumulative number of vulnerabilities that will be disclosed after software is released. A …
S Axelsson, U Lindqvist, U Gustafson… - Proceedings of the …, 1998 - books.google.com
Off-line intrusion detection systems rely on logged data. However, the logging mechanism may be complicated and time-consuming and the amount of logged data tends to be very …
Intrusion Tolerance has become a reference paradigm for dealing with intrusions and accidental faults, achieving security and dependability in an automatic way, much along the …