[HTML][HTML] Adaptive monitoring, detection, and response for agile digital service chains

M Repetto - Computers & Security, 2023 - Elsevier
Modern business is increasingly adopting fully-digital workflows composed of
complementary services (in terms of infrastructures, software, networks, data and devices) …

Multiontology construction and application of threat model based on adversarial attack and defense under iso/iec 27032

X Hu, D Cheng, J Chen, X **, B Wu - IEEE Access, 2022 - ieeexplore.ieee.org
Research pertaining to threat modeling is significant. However, the existing threat modeling
methods suffer from ambiguity, heterogeneity and incompleteness; furthermore, the threat …

Interface to Security Functions: An overview and comparison of I2NSF and OpenC2

M Repetto - IEEE Communications Standards Magazine, 2023 - ieeexplore.ieee.org
Recent management paradigms for software-defined infrastructures bring more agility to the
creation and operation of digital services, but also introduce new cyber-security issues due …

Software security vulnerability patterns based on ontology

X HU, J CHEN, H LI - 北京航空航天大学学报, 2022 - bhxb.buaa.edu.cn
This paper studies the lifetime of software security vulnerabilities under the DevSecOps
framework aiming at the conceptual confusion problem of research on software errors and …

[HTML][HTML] 基于本体的软件安全漏洞模式

胡璇, 陈俊名, **海峰 - 北京航空航天大学学报, 2022 - bhxb.buaa.edu.cn
针对软件缺陷与软件安全漏洞研究中存在的概念混淆问题, 对DevSecOps
框架下的软件安全漏洞生存期进行研究. 基于软件安全漏洞生存期引入漏洞的4 种情况 …

[PDF][PDF] PrivateHome: Control privacy in the smart home

SL Kamp - pure.tue.nl
From 2017 to 2025, the number of households that own smart home devices will be more
than doubled [1]. With this fast-growing market, challenges arise, and more and more …