A survey of cyber security management in industrial control systems
Contemporary industrial control systems no longer operate in isolation, but use other
networks (eg, corporate networks and the Internet) to facilitate and improve business …
networks (eg, corporate networks and the Internet) to facilitate and improve business …
A survey of information security incident handling in the cloud
Incident handling strategy is one key strategy to mitigate risks to the confidentiality, integrity
and availability (CIA) of organisation assets, as well as minimising loss (eg financial …
and availability (CIA) of organisation assets, as well as minimising loss (eg financial …
A survey on industrial control system digital forensics: challenges, advances and future directions
Operational Technology (OT) systems have become increasingly interconnected and
automated, consequently resulting in them becoming targets of cyber attacks, with the threat …
automated, consequently resulting in them becoming targets of cyber attacks, with the threat …
A survey on forensics and compliance auditing for critical infrastructure protection
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …
On security in publish/subscribe services: A survey
Publish/subscribe services have encountered considerable success in the building of
modern large-scale mission-critical systems. Such systems are characterized by several non …
modern large-scale mission-critical systems. Such systems are characterized by several non …
Forensic experts' view of forensic‐ready software systems: A qualitative study
Software engineers widely acknowledge the inclusion of security requirements in the early
stages of the development process. However, the need to prepare the software for the failure …
stages of the development process. However, the need to prepare the software for the failure …
Towards a SCADA forensics architecture
With the increasing threat of sophisticated attacks on critical infrastructures, it is vital that
forensic investigations take place immediately following a security incident. This paper …
forensic investigations take place immediately following a security incident. This paper …
Continuous and transparent user identity verification for secure internet services
Session management in distributed Internet services is traditionally based on username and
password, explicit logouts and mechanisms of user session expiration using classic …
password, explicit logouts and mechanisms of user session expiration using classic …
Insider threat assessment: A model-based methodology
Security is a major challenge for today's companies, especially ICT ones which manage
large scale cyber-critical systems. Amongst the multitude of attacks and threats to which a …
large scale cyber-critical systems. Amongst the multitude of attacks and threats to which a …
Enhancing intrusion detection in wireless sensor networks through decision trees
A Garofalo, C Di Sarno, V Formicola - … 2013, Coimbra, Portugal, May 15-16 …, 2013 - Springer
Abstract Wireless Sensor Networks (WSNs) are being increasingly adopted also in very
sensitive applications where it is of paramount importance to ensure that the sensor network …
sensitive applications where it is of paramount importance to ensure that the sensor network …