A comprehensive study of security and cyber-security risk management within e-Health systems: Synthesis, analysis and a novel quantified approach
Abstract Internet of Things (IoT) applications are among the major trends of nowadays.
Billions of connected devices are creating great business profits and performing a multitude …
Billions of connected devices are creating great business profits and performing a multitude …
A systematic literature review for authorization and access control: definitions, strategies and models
Purpose Authorization and access control have been a topic of research for several
decades. However, existing definitions are inconsistent and even contradicting each other …
decades. However, existing definitions are inconsistent and even contradicting each other …
A survey for user behavior analysis based on machine learning techniques: current models and applications
Significant research has been carried out in the field of User Behavior Analysis, focused on
understanding, modeling and predicting past, present and future behaviors of users …
understanding, modeling and predicting past, present and future behaviors of users …
Multimodel-based incident prediction and risk assessment in dynamic cybersecurity protection for industrial control systems
Q Zhang, C Zhou, N **ong, Y Qin, X Li… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Currently, an increasing number of information/communication technologies are adopted
into the industrial control systems (ICSs). While these IT technologies offer high flexibility …
into the industrial control systems (ICSs). While these IT technologies offer high flexibility …
Is this really you? An empirical study on risk-based authentication applied in the wild
Risk-based authentication (RBA) is an adaptive security measure to strengthen password-
based authentication. RBA monitors additional implicit features during password entry such …
based authentication. RBA monitors additional implicit features during password entry such …
More than just good passwords? A study on usability and security perceptions of risk-based authentication
Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-
based authentication. RBA monitors additional features during login, and when observed …
based authentication. RBA monitors additional features during login, and when observed …
Risk-based access control model: A systematic literature review
Most current access control models are rigid, as they are designed using static policies that
always give the same outcome in different circumstances. In addition, they cannot adapt to …
always give the same outcome in different circumstances. In addition, they cannot adapt to …
What's in score for website users: A data-driven long-term study on risk-based authentication characteristics
Risk-based authentication (RBA) aims to strengthen password-based authentication rather
than replacing it. RBA does this by monitoring and recording additional features during the …
than replacing it. RBA does this by monitoring and recording additional features during the …
A framework and risk assessment approaches for risk-based access control in the cloud
DR dos Santos, R Marinho, GR Schmitt… - Journal of Network and …, 2016 - Elsevier
Cloud computing is advantageous for customers and service providers. However, it has
specific security requirements that are not captured by traditional access control models, eg …
specific security requirements that are not captured by traditional access control models, eg …
Super learner ensemble for anomaly detection and cyber-risk quantification in industrial control systems
Industrial control systems (ICSs) are integral parts of smart cities and critical to modern
societies. Despite indisputable opportunities introduced by disruptor technologies, they …
societies. Despite indisputable opportunities introduced by disruptor technologies, they …