A survey of contemporary cyber security vulnerabilities and potential approaches to automated defence

R Mazzolin, AM Samueli - 2020 IEEE International Systems …, 2020 - ieeexplore.ieee.org
Western societies' technological superiority potentially serves as its principal vulnerability.
As technology manifests itself into the fabric of our daily existence, our personal lives …

[PDF][PDF] Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques.

MN Alsaleh, E Al-Shaer, Q Duan - ICETE (2), 2018 - scitepress.org
As the sophistication of cyber-attacks is ever increasing, cyber breaches become inevitable
and their consequences are often highly damaging. Isolation and diversity are key …

[PDF][PDF] An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation-A Review

R Mazzolin, A Madni - jenrs.com
Executive leadership in government, military and industry are faced with many difficult
challenges when trying to understand the complex interaction of public and government …

Formal techniques for cyber resilience: modeling, synthesis, and verification

MN Alsaleh - 2018 - search.proquest.com
As cyber vulnerability and complexity increases, cyber attacks become highly sophisticated
and inevitable. Therefore, cyber resilience is necessary to make cyber capable of …

[PDF][PDF] IEEE Invited Paper-An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation-A …

R Mazzolin, A Madni - academia.edu
Executive leadership in government, military and industry are faced with many difficult
challenges when trying to understand the complex interaction of public and government …

Balanceamento entre segurança e desempenho na comunicação entre os planos de controle e dados em redes definidas por software

AMS Orozco - 2018 - tede2.pucrs.br
Nowadays, cryptography is being widely used as a standard for securing data exchange on
the Internet. For instance, in software-defined networking, it is possible to apply cryptography …

Exploring the Strategies Network Security Managers Need to Protect Their Networks from Backdoor Intrusions

LO Rivera-Lopez - 2018 - search.proquest.com
The problem addressed is the strategies network security managers need to protect their
networks from backdoor intrusions. Twelve participants that had experience as network …