Real-time system call-based ransomware detection
Ransomware, particularly crypto ransomware, has emerged as the go-to malware for threat
actors aiming to compromise data on Android devices as well as in general. In this paper …
actors aiming to compromise data on Android devices as well as in general. In this paper …
A model-based approach for self-adaptive security in CPS: Application to smart grids
Security risk assessment is an important challenge in the design of Cyber Physical Systems
(CPS). Even more importantly, the intrinsically dynamical nature of these systems, due to …
(CPS). Even more importantly, the intrinsically dynamical nature of these systems, due to …
Compositional Security Analysis of Dynamic Component-based Systems
N Khakpour, C Skandylas - Proceedings of the 39th IEEE/ACM …, 2024 - dl.acm.org
To reason about and enforce security in dynamic software systems, automated analysis and
verification approaches are required. However, such approaches often encounter scalability …
verification approaches are required. However, such approaches often encounter scalability …
Security Countermeasure Selection for Component-Based Software-Intensive Systems
C Skandylas, N Khakpour… - 2022 IEEE 22nd …, 2022 - ieeexplore.ieee.org
Given the increasing complexity of softwareintensive systems as well as the sophistication
and high frequency of cyber-attacks, automated and sound approaches to select …
and high frequency of cyber-attacks, automated and sound approaches to select …
Streamlining Attack Tree Generation: A Fragment-Based Approach
Attack graphs are a tool for analyzing security vulnerabilities that capture different and
prospective attacks on a system. As a threat modeling tool, it shows possible paths that an …
prospective attacks on a system. As a threat modeling tool, it shows possible paths that an …
Editorial for FGCS special issue: Advances in self-protecting systems
Given the always increasing size of computer systems, manually protecting them in case of
attacks is unfeasible and error-prone. For this reason, a new body of work is emerging …
attacks is unfeasible and error-prone. For this reason, a new body of work is emerging …
[PDF][PDF] Study of Self-Protection in Mobile Applications
AA Al Abri, NK Salih - Journal homepage: www. ijrpr. com ISSN - researchgate.net
Business and individuals become more dependent on mobile phones, where the mobility
and the fast increment of mobile applications gives an advantage for the rapid growth of the …
and the fast increment of mobile applications gives an advantage for the rapid growth of the …
Design and analysis of self-protection: Adaptive security for software-intensive systems
C Skandylas - 15th European Conference on Software Architecture …, 2021 - diva-portal.org
Today's software landscape features a high degree of complexity, frequent change and
many uncertainties. Cyber-attacks are a common occurrence and their consequences are …
many uncertainties. Cyber-attacks are a common occurrence and their consequences are …