Survey of attack projection, prediction, and forecasting in cyber security

M Husák, J Komárková, E Bou-Harb… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …

A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic

HS Lallie, LA Shepherd, JRC Nurse, A Erola… - Computers & …, 2021 - Elsevier
The COVID-19 pandemic was a remarkable, unprecedented event which altered the lives of
billions of citizens globally resulting in what became commonly referred to as the new …

Toward developing efficient Conv-AE-based intrusion detection system using heterogeneous dataset

MA Khan, J Kim - Electronics, 2020 - mdpi.com
Recently, due to the rapid development and remarkable result of deep learning (DL) and
machine learning (ML) approaches in various domains for several long-standing artificial …

A critical review of cyber-physical security for building automation systems

G Li, L Ren, Y Fu, Z Yang, V Adetola, J Wen… - Annual Reviews in …, 2023 - Elsevier
Abstract Modern Building Automation Systems (BASs), as the brain that enable the
smartness of a smart building, often require increased connectivity both among system …

Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

Systematic literature review of security event correlation methods

I Kotenko, D Gaifulina, I Zelichenok - IEEE Access, 2022 - ieeexplore.ieee.org
Security event correlation approaches are necessary to detect and predict incremental
threats such as multi-step or targeted attacks (advanced persistent threats) and other causal …

Mitigasi Ancaman Resiko Keamanan Siber Di Masa Pandemi Covid-19

Y Herdiana, Z Munawar, NI Putri - Jurnal ICT: Information …, 2021 - ejournal.ikmi.ac.id
Mitigasi keamanan siber diperlukan sebagai perlindungan dari pencurian dan gangguan
pada sistem informasi, perangkat lunak dan perangkat keras. Meningkatnya kecemasan …

Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design

JBF Sequeiros, FT Chimuco, MG Samaila… - ACM Computing …, 2020 - dl.acm.org
Over the years, pervasive computing and communication technologies have enabled the
emergence of new computing paradigms that have gained importance across a wide …

[PDF][PDF] Why would we get attacked? An analysis of attacker's aims behind DDoS attacks.

A Abhishta, W van Heeswijk, M Junger… - J. Wirel. Mob …, 2020 - researchgate.net
Reliable availability to the internet and internet-based services is crucial in today's world.
DDoS attacks pose a severe threat to the availability of such online resources–especially …