Software-defined networking: A comprehensive survey

D Kreutz, FMV Ramos, PE Verissimo… - Proceedings of the …, 2014 - ieeexplore.ieee.org
The Internet has led to the creation of a digital society, where (almost) everything is
connected and is accessible from anywhere. However, despite their widespread adoption …

Byzantine fault-tolerant state-machine replication from a systems perspective

T Distler - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Byzantine fault-tolerant (BFT) state-machine replication makes it possible to design systems
that are resilient against arbitrary faults, a requirement considered crucial for an increasing …

[HTML][HTML] Security information and event management (SIEM): Analysis, trends, and usage in critical infrastructures

G González-Granadillo, S González-Zarzosa, R Diaz - Sensors, 2021 - mdpi.com
Security Information and Event Management (SIEM) systems have been widely deployed as
a powerful tool to prevent, detect, and react against cyber-attacks. SIEM solutions have …

Design choices for central bank digital currency: Policy and technical considerations

S Allen, S Čapkun, I Eyal, G Fanti, BA Ford… - 2020 - nber.org
Central banks around the world are exploring and in some cases even piloting Central Bank
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …

Towards secure and dependable software-defined networks

D Kreutz, FMV Ramos, P Verissimo - … workshop on Hot topics in software …, 2013 - dl.acm.org
Software-defined networking empowers network operators with more flexibility to program
their networks. With SDN, network management moves from codifying functionality in terms …

Antecedents for enhanced level of cyber-security in organisations

S Kumar, B Biswas, MS Bhatia, M Dora - Journal of Enterprise …, 2021 - emerald.com
Purpose The present study aims to identify and investigate the antecedents of enhanced
level of cyber-security at the organisational level from both the technical and the human …

[HTML][HTML] A look at the time delays in CVSS vulnerability scoring

J Ruohonen - Applied Computing and Informatics, 2019 - Elsevier
This empirical paper examines the time delays that occur between the publication of
Common Vulnerabilities and Exposures (CVEs) in the National Vulnerability Database …

The multiple facets of software diversity: Recent developments in year 2000 and beyond

B Baudry, M Monperrus - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Early experiments with software diversity in the mid 1970s investigated N-version
programming and recovery blocks to increase the reliability of embedded systems. Four …

Dynamical analysis of diversity in rule-based open source network intrusion detection systems

H Asad, I Gashi - Empirical Software Engineering, 2022 - Springer
Diverse layers of defence play an important role in the design of defence-in-depth
architectures. The use of Intrusion Detection Systems (IDSs) are ubiquitous in this design …

Dynamic heterogeneous redundancy-based joint safety and security for connected automated vehicles: Preliminary simulation and field test results

Y Li, Q Liu, W Zhuang, Y Zhou… - IEEE Vehicular …, 2023 - ieeexplore.ieee.org
For connected automated vehicles (CAVs), safety and security are two interrelated critical
issues since many in-vehicle components are both safety critical and security critical. To …