Match!
Computers & Security
IF
3.06
Papers
6382
Papers 6381
1 page of 639 pages (6,381 results)
Newest
#2Mourad DebbabiH-Index: 31
Last. Djedjiga MouhebH-Index: 9
view all 4 authors...
Source
Source
#1George Stergiopoulos (OPA: Athens University of Economics and Business)H-Index: 6
#2Panagiotis Dedousis (OPA: Athens University of Economics and Business)
Last. Dimitris Gritzalis (OPA: Athens University of Economics and Business)H-Index: 31
view all 3 authors...
Abstract In the 4th industrial revolution era, security of multiple interconnected devices has become a critical issue. A rapidly increasing number of cybersecurity incidents emerge due to complex interconnected sensors, devices, and systems used in the Internet of Things. In this paper, we tackle the need for automation in security risk analysis and restructuring of such networks. The presented framework models the connections of assets and devices so as to depict their interdependencies on a c...
Source
#1Waqas Haider (Canberra Institute of Technology)
#2Nour Moustafa (UNSW: University of New South Wales)H-Index: 13
Last. Abdul Wahab (Riphah International University)H-Index: 2
view all 6 authors...
Abstract As existing system calls-based Host Anomaly Detection Systems (HADSs) exclude hidden patterns that can reside in the elapsed times of system calls with respect to the lifecycle of a kernel-calling process, they lack precision in the construction of behavioral regions for assisting in reliably protecting hosts against modern unknown attacks. In this paper, a HADS, the so-called Fuzzy Gaussian Mixture-based Correntropy (FGMC-HADS), based on the fuzzy rough set attribute reduction (FRAR) m...
Source
#2Lihua YinH-Index: 4
Last. Zhihong TianH-Index: 17
view all 6 authors...
Source
Source
#1Ashraf Tantawy (VCU: Virginia Commonwealth University)H-Index: 1
#2Sherif Abdelwahed (VCU: Virginia Commonwealth University)H-Index: 18
Last. Khaled Bashir Shaban (Qatar University)H-Index: 15
view all 4 authors...
Traditional techniques for Cyber-Physical Systems (CPS) security design either treat the cyber and physical systems independently, or do not address the specific vulnerabilities of real time embedded controllers and networks used to monitor and control physical processes. In this work, we develop and test an integrated model-based approach for CPS security risk assessment utilizing a CPS testbed with real-world industrial controllers and communication protocols. The testbed monitors and controls...
1 CitationsSource
#1Abdelaziz Amara Korba (UBMA: University of Annaba)H-Index: 3
#1Amara korba Abdelaziz (UBMA: University of Annaba)
Last. Nour El Islem Karabadji (UBMA: University of Annaba)H-Index: 5
view all 4 authors...
Abstract The Advanced Metering Infrastructure (AMI) is one of the key components of the smart grid. It provides interactive services for managing billing and electricity consumption, but it also introduces new vectors for cyberattacks. Although, the devastating and severe impact of power overloading cyberattacks on smart grid AMI, few researches in the literature have addressed them. In the present paper, we propose a two-level anomaly detection framework based on regression decision trees. The ...
Source
#1Hwee-Joo Kam (UT: University of Tampa)H-Index: 5
#2Philip Menard (UTSA: University of Texas at San Antonio)H-Index: 5
Last. Robert E. Crossler (WSU: Washington State University)H-Index: 12
view all 4 authors...
Abstract Because there is a critical shortage of cybersecurity talent, information security professionals and researchers should cultivate cybersecurity skills by encouraging individuals to pursue cybersecurity learning. However, some aspects of cybersecurity require substantial effort and perseverance for conceptual understanding to be gained. We propose motivation as the key to ensuring continuous engagement with and successful learning of such cybersecurity concepts. With a lab-based training...
Source
Source
12345678910
Top fields of study
Security information and event management
Internet privacy
Computer network
Computer security
Computer science
Information security