ShoVAT: Shodan‐based vulnerability assessment tool for Internet‐facing services

B Genge, C Enăchescu - Security and communication …, 2016‏ - Wiley Online Library
Shodan has been acknowledged as one of the most popular search engines available
today, designed to crawl the Internet and to index discovered services. This paper expands …

[HTML][HTML] Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems

A Zimba, Z Wang, H Chen - Ict Express, 2018‏ - Elsevier
The inevitable integration of critical infrastructure to public networks has exposed the
underlying industrial control systems to various attack vectors. In this paper, we model multi …

Using virtual environments for the assessment of cybersecurity issues in IoT scenarios

A Furfaro, L Argento, A Parise, A Piccolo - Simulation Modelling Practice …, 2017‏ - Elsevier
Abstract Internet of Things (IoT) has been forecast as the next main evolution in the field of
Information and Communication Technology. Recent studies confirm a steep and constant …

Security of industrial sensor network-based remote substations in the context of the internet of things

C Alcaraz, R Roman, P Najera, J Lopez - Ad Hoc Networks, 2013‏ - Elsevier
The main objective of remote substations is to provide the central system with sensitive
information from critical infrastructures, such as generation, distribution or transmission …

A security metrics framework for the cloud

J Luna, H Ghani, D Germanus… - Proceedings of the …, 2011‏ - ieeexplore.ieee.org
Cloud computing is redefining the on-demand usage of remotely-located, and highly
available computing resources to the user. Unfortunately, while the many economic and …

[PDF][PDF] Quantitative assessment of cloud security level agreements: A case study

J Luna, H Ghani, T Vateva… - Proc. of Security …, 2012‏ - download.hrz.tu-darmstadt.de
The users of Cloud Service Providers (CSP) often motivate their choice of providers based
on criteria such as the offered service level agreements (SLA) and costs, and also recently …

An access control management protocol for internet of things devices

M Taylor, D Reilly, B Lempereur - Network Security, 2017‏ - Elsevier
The Internet of Things (IoT) enables the integration of data from virtual and physical worlds.
1 It involves smart objects that can understand and react to their environment in a variety of …

[PDF][PDF] Security challenges and countermeasures for the heterogeneity of IoT applications

D Choudhary - Journal of Autonomous Intelligence, 2019‏ - en.front-sci.com
Abstract The Internet of Things (IoT) enables the integration of data from virtual and physical
worlds. It involves smart objects that can understand and react to their environment in a …

Risk model development for information security in organization environment based on business perspectives

PD Ibnugraha, LE Nugroho, PI Santosa - International Journal of …, 2021‏ - Springer
Digital information plays an essential role in supporting organizational business. However,
incidents of sensitive information leakage often happen in organization environment …

[ספר][B] Embracing security in all phases of the software development life cycle: A Delphi study

M Deschene - 2016‏ - search.proquest.com
Software is omnipresent from refrigerators to financial institutions. In addition to software that
defines cyber system functionality, there is an increasing amount of digitized data on cyber …