Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design

JBF Sequeiros, FT Chimuco, MG Samaila… - ACM Computing …, 2020‏ - dl.acm.org
Over the years, pervasive computing and communication technologies have enabled the
emergence of new computing paradigms that have gained importance across a wide …

A review of asset-centric threat modelling approaches

LO Nweke, S Wolthusen - 2020‏ - ntnuopen.ntnu.no
The threat landscape is constantly evolving. As attackers continue to evolve and seek better
methods of compro-mising a system; in the same way, defenders continue to evolve and …

[PDF][PDF] Cyber threat modeling: Survey, assessment, and representative framework

DJ Bodeau, CD McCollum… - Mitre Corp …, 2018‏ - wmx-api-production.s3.amazonaws …
This report provides a survey of cyber threat modeling frameworks, presents a comparative
assessment of the surveyed frameworks, and extends an existing framework to serve as a …

Threat modeling of internet of things health devices

A Omotosho, B Ayemlo Haruna… - Journal of Applied …, 2019‏ - Taylor & Francis
For a number of health conditions, the number of Internet of Things (IoT) devices available
for self and remote monitoring are growing rapidly, and users are also increasing. In the …

[PDF][PDF] TPA auditing to enhance the privacy and security in cloud systems

S Kumar, D Kumar… - Journal of Cyber …, 2021‏ - journals.riverpublishers.com
Over the last decade, many enterprises around the world migrating from traditional
infrastructure to cloud resources in order to cut down operational and capital expenditure …

Expediting the design and development of secure cloud-based mobile apps

FT Chimuco, JBF Sequeiros, TMC Simōes… - International Journal of …, 2024‏ - Springer
The adoption and popularity of mobile devices by end-users is partially driven by the
increasing development and availability of mobile applications that can aid solving different …

[PDF][PDF] A hybrid algorithm for improving the quality of service in MANET

MH Hassan, SA Mostafa, A Budiyono… - International Journal on …, 2018‏ - core.ac.uk
A mobile ad-hoc network (MANET) exhibits a dynamic topology with flexible infrastructure.
The MANET nodes may serve as both host and router functionalities. The routing feature of …

Stackelberg security game for optimizing cybersecurity decisions in cloud computing

A Ait Temghart, M Marwan… - Security and …, 2023‏ - Wiley Online Library
As it is difficult to cover all cybersecurity threats, an optimal defense strategy is one of the
focal issues in cloud computing due to its dynamic abstraction and scalability. On this basis …

[PDF][PDF] Performance evaluation of AODV and OLSR routing protocols in MANET environment

MA Jubair, SH Khaleefah, A Budiyono… - Int. J. Adv. Sci. Eng …, 2018‏ - researchgate.net
Mobile Ad-hoc Networks (MANETs) are self-sufficient networks that can work without the
need for centralized controls, pre-configuration to the routes or advance infrastructures. The …

An analysis of malicious threat agents for the smart connected home

J Bugeja, A Jacobsson… - 2017 IEEE international …, 2017‏ - ieeexplore.ieee.org
Smart connected home systems aim to enhance the comfort, convenience, security,
entertainment, and health of the householders and their guests. Despite their advantages …