Filters








369 Hits in 8.4 sec

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Adam James Hall, Nikolaos Pitropakis, William J Buchanan, Naghmeh Moradpoor
<span title="">2018</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/faqqmambavbalpofpx3p6nntua" style="color: black;">2018 IEEE International Conference on Big Data (Big Data)</a> </i> &nbsp;
This paper uses the CERT dataset r4.2 along with a series of machine learning classifiers to predict the occurrence of a particular malicious insider threat scenario -the uploading sensitive information  ...  It also defines a methodology for performing pre-processing on organizational log data into daily user summaries for classification, and is used to train multiple classifiers.  ...  Some are improved by the boosting approach and some do not perform as well. The best performing classifiers are selected to be aggregated into a heterogeneous stack classifier.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/bigdata.2018.8621922">doi:10.1109/bigdata.2018.8621922</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/bigdataconf/HallPBM18.html">dblp:conf/bigdataconf/HallPBM18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fqkxudkllvb6lhdkf7nqo3jpzu">fatcat:fqkxudkllvb6lhdkf7nqo3jpzu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200307170400/https://www.napier.ac.uk/~/media/worktribe/output-1370217/predicting-malicious-insider-threat-scenarios-using-organizational-data-and-a.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/12/ff/12ffaef60f43a4e90f3ca6e033def007f0552633.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/bigdata.2018.8621922"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Automatic Derivation and Validation of a Cloud Dataset for Insider Threat Detection

Pamela Carvalllo, Ana R. Cavalli, Natalia Kushik
<span title="">2017</span> <i title="SCITEPRESS - Science and Technology Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6td763yb3fajbp5xyrmju3slwu" style="color: black;">Proceedings of the 12th International Conference on Software Technologies</a> </i> &nbsp;
In this paper, we focus on the derivation and validation of the dataset for cloud-based malicious insider threat.  ...  The malicious insider threat is often listed as one of the most dangerous cloud threats.  ...  Finally, we will intend to propose novel prediction techniques for insider threats, following the capability of dynamically deploying different use-case scenarios.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5220/0006480904800487">doi:10.5220/0006480904800487</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icsoft/CarvallloCK17.html">dblp:conf/icsoft/CarvallloCK17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ek2h6vg455czzky63hw3hysewm">fatcat:ek2h6vg455czzky63hw3hysewm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190219191754/http://pdfs.semanticscholar.org/1a28/1521aa0e45e28530d1f09c16fc0dfee081de.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1a/28/1a281521aa0e45e28530d1f09c16fc0dfee081de.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5220/0006480904800487"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Transferable Cost-Aware Security Policy Implementation for Malware Detection Using Deep Reinforcement Learning [article]

Yoni Birman, Shaked Hindi, Gilad Katz, Asaf Shabtai
<span title="2020-05-20">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
This security policy is then implemented, and for each inspected file, a different set of detectors is assigned and a different detection threshold is set.  ...  Moreover, with an ever-increasing number of files to process, the use of ensembles may incur unacceptable processing times and costs (e.g., cloud resources).  ...  Then, a Random Forest classifier with 100 trees was trained to classify the file.dalvikapi. This detector uses permissions and Dalvik API calls to detect malicious APKs [6] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1905.10517v2">arXiv:1905.10517v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/aj3hxg64onabrh4jwy6kmxe5qa">fatcat:aj3hxg64onabrh4jwy6kmxe5qa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200527082035/https://arxiv.org/pdf/1905.10517v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1905.10517v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Intelligent Techniques for Detecting Network Attacks: Review and Research Directions

Malak Aljabri, Sumayh S. Aljameel, Rami Mustafa A. Mohammad, Sultan H. Almotiri, Samiha Mirza, Fatima M. Anis, Menna Aboulnour, Dorieh M. Alomari, Dina H. Alhamed, Hanan S. Altamimi
<span title="2021-10-25">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks.  ...  Network attacks refer to all types of unauthorized access to a network including any attempts to damage and disrupt the network, often leading to serious consequences.  ...  IDS) ANN [44,58,120,123,128,133] 6 Phishing, Zero-Day, IDS 99.6% (Zero-Day) RNN [10,16,21,24,41,42,82,106,117,146] 10 Insider Threat, DDoS, Malicious Traffic, IDS 100% (Insider Threat) Insider Threat,  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s21217070">doi:10.3390/s21217070</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/34770375">pmid:34770375</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC8587628/">pmcid:PMC8587628</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tnedw4hhcze7foqps3jfpiog7u">fatcat:tnedw4hhcze7foqps3jfpiog7u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211116203902/https://mdpi-res.com/d_attachment/sensors/sensors-21-07070/article_deploy/sensors-21-07070-v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e2/97/e297f79894abf58350f296bfc87455a8bd1fe219.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s21217070"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8587628" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

D2.1 The COLLABS Level-3 Security Package for Secure Digital Supply Networks: MVP

Miloš Radovanović, Nataša Vujnović Sedlar, Srđan Škrbić
<span title="2020-12-23">2020</span> <i title="Zenodo"> Zenodo </i> &nbsp;
), T2.4 (Statistical Analytics and Machine- / Deep-Learning on shared data), T2.5 (Distributed anomaly detection for Industrial IoT) and T2.6 (Workflow-driven security for supply chain and compliance in  ...  This deliverable is the first output of Work Package 2 tasks T2.1 (Tools and methods for secure data sharing), T2.2 (Trustworthiness of data flows), T2.3 (Machine learning-based cognitive security framework  ...  In the COLLABS framework, all of the modules and devices will aim to use strong encryption but there is still a residual threat from malicious insider activity or human error.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.5666952">doi:10.5281/zenodo.5666952</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hwa4x5pwnrdqva2tbp4kspnkhi">fatcat:hwa4x5pwnrdqva2tbp4kspnkhi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211117144818/https://zenodo.org/record/5666952/files/D2.1_COLLABS_Level-3_Security_Package_for_secured_digital_supply_networks_mvp.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b2/0d/b20d0bdaa6fa630ef37712dcccf0c0c46405824a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.5666952"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Cloud computing, reliability and security issue

Alireza Ghobadi, Roozbeh Karimi, Farnaz Heidari, Masoud Samadi
<span title="">2014</span> <i title="Global IT Research Institute (GIRI)"> 16th International Conference on Advanced Communication Technology </i> &nbsp;
Cloud computing with its utilities is one of the realities that the most of the industrial and educational has a dream.  ...  However, the cloud computing has the potential to solve a lot of problems (such as easy sharing, transform a large part of the IT industry) but still the performance, reliability, and the security is the  ...  Also for more understanding, defines a scenario and explains issues based on this scenario.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icact.2014.6779012">doi:10.1109/icact.2014.6779012</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/opdxrqcwrvamzggsjfd3pwlr6q">fatcat:opdxrqcwrvamzggsjfd3pwlr6q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706043635/http://icact.org/upload/2014/0470/20140470_finalpaper.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/55/fe/55fe0148042213b2975f93120ebdd29d17a6e6b0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icact.2014.6779012"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

D2.2 The COLLABS Level-3 Security Package for Secure Digital Supply Networks: 1st complete version

Panagiotis Rizomiliotis, Konstantinos Tserpes, Aikaterini Triakosia
<span title="2021-06-30">2021</span> <i title="Zenodo"> Zenodo </i> &nbsp;
(Statistical Analytics and Machine- / Deep-Learning on shared data), T2.5 (Distributed anomaly detection for Industrial IoT) and T2.6 (Workflow-driven security for supply chain and compliance in manufacturing  ...  This the second deliverable of Work Package 2 tasks T2.1 (Tools and methods for secure data sharing), T2.2 (Trustworthiness of data flows), T2.3 (Machine learning-based cognitive security framework), T2.4  ...  In the COLLABS framework, all of the modules and devices will aim to use strong encryption but there is still a residual threat from malicious insider activity or human error.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.5667012">doi:10.5281/zenodo.5667012</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xgzhqfeq6nbwte4h256pntlkau">fatcat:xgzhqfeq6nbwte4h256pntlkau</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211113050931/https://zenodo.org/record/5667012/files/D2.2_COLLABS_Level-3_Security_Package.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1f/00/1f00127a7237f8d43cf191a03730d1147a860933.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.5667012"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Role of Device Identification and Manufacturer Usage Description in IoT security: A Survey

Noman Mazhar, Rosli Salleh, Muhammad Zeeshan, M. Muzaffar Hameed
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
This paper initially identifies and classifies the potential vulnerabilities in IoT devices.  ...  Finally, the research presents an overview of MUD technology, its implementation scenarios, the limitation of the latest MUD standard, and its applications in the industry.  ...  ACKNOWLEDGMENT The authors of this research would like to thank the anonymous reviewers for the valuable comments and constructive suggestions, and their insights to improve the quality of the manuscript  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3065123">doi:10.1109/access.2021.3065123</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5gofmkoawbccvhum5zuo3i7vya">fatcat:5gofmkoawbccvhum5zuo3i7vya</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210717160648/https://ieeexplore.ieee.org/ielx7/6287639/9312710/09374442.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/76/21/7621014babec2acf4dde2a060f03ff771a826801.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3065123"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Machine Learning in IoT Security: Current Solutions and Future Challenges [article]

Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, Ekram Hossain
<span title="2019-03-14">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
This is, at least in part, because of the resource constraints, heterogeneity, massive real-time data generated by the IoT devices, and the extensively dynamic behavior of the networks.  ...  The future Internet of Things (IoT) will have a deep economical, commercial and social impact on our lives.  ...  These models are used as a basis for making future predictions based on the newly input data.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1904.05735v1">arXiv:1904.05735v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/k5v6zad7lfhdrjngjmxgroafz4">fatcat:k5v6zad7lfhdrjngjmxgroafz4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191017004344/https://arxiv.org/pdf/1904.05735v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bf/da/bfdad8066d2b8dff3e9bae43715724813ad5dbc3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1904.05735v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Requirements Capture and Comparative Analysis of Cloud Security Techniques

Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim
<span title="2015-04-30">2015</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/k7f2snpxzrhybfen3tkjr6uoa4" style="color: black;">International Journal of Grid and Distributed Computing</a> </i> &nbsp;
There are various issues that need to be dealt with respect to security and privacy in a Cloud computing scenario.  ...  These architectures can be used for business, scientific, and other computing purposes.  ...  The impact and the frequency of the identified threats should be used in providing an accurate prediction of the risk events.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijgdc.2015.8.2.25">doi:10.14257/ijgdc.2015.8.2.25</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2vjojoyr5be7xpc7kal77mssqy">fatcat:2vjojoyr5be7xpc7kal77mssqy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603150956/http://www.sersc.org/journals/IJGDC/vol8_no2/25.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9b/45/9b4564d830edf688be17f2d0f41bc335f974dca2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijgdc.2015.8.2.25"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

SDN based Intrusion Detection and Prevention Systems using Manufacturer Usage Description: A Survey

Noman Mazhar, Rosli Salleh, Mohammad Asif, Muhammad Zeeshan
<span title="">2020</span> <i title="The Science and Information Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2yzw5hsmlfa6bkafwsibbudu64" style="color: black;">International Journal of Advanced Computer Science and Applications</a> </i> &nbsp;
ML is used in the IDPS systems for the detection of security attacks and to predict future threats to the system.  ...  In traditional networks, detection of malicious traffic and classification of a network attack is achieved using predefined rules and specifications which are limited to address new kinds of attacks.  ...  For predictive data modelling, the system uses the decision tree and random forest algorithms, to monitor malicious and suspicious traffic. Response module works based on alerts.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2020.0111283">doi:10.14569/ijacsa.2020.0111283</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xhnac6wchnbxdfztz2b666l4ra">fatcat:xhnac6wchnbxdfztz2b666l4ra</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210118163000/https://thesai.org/Downloads/Volume11No12/Paper_83-SDN_based_Intrusion_Detection_and_Prevention.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ca/e5/cae54c65b6b911d82335de4ffdffd2205a9227d3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2020.0111283"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures

Muath A. Obaidat, Suhaib Obeidat, Jennifer Holst, Abdullah Al Hayajneh, Joseph Brown
<span title="2020-05-30">2020</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mvyhkzd6pbcqznrpy72k57bd6y" style="color: black;">Computers</a> </i> &nbsp;
The Internet of Things (IoT) has experienced constant growth in the number of devices deployed and the range of applications in which such devices are used.  ...  Moreover, the study proposes mitigations and countermeasures, taking a multi-faceted approach rather than a per layer approach.  ...  This is considered an insider threat since the attacker must physically exist and insert the node into the network [84] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/computers9020044">doi:10.3390/computers9020044</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/v2iru7ncd5gppjd2qwse4v4axi">fatcat:v2iru7ncd5gppjd2qwse4v4axi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200603224051/https://res.mdpi.com/d_attachment/computers/computers-09-00044/article_deploy/computers-09-00044.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d4/13/d413be2854f78f963845d6a6ac3ad8d694e58287.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/computers9020044"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Critical infrastructure protection: Requirements and challenges for the 21st century

Cristina Alcaraz, Sherali Zeadally
<span title="">2015</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7wtkabzdyrhbln4xrtz33jslae" style="color: black;">International Journal of Critical Infrastructure Protection</a> </i> &nbsp;
We explore the various vulnerabilities and threats currently present in critical infrastructures and describe protection measures that can be deployed to mitigate those threats.  ...  Today, critical infrastructures have become an integral part of cyberspace and they play a vital role in supporting many of our daily activities (including travel, water and power usage, financial transactions  ...  The research leading to these results has received funding from the MARIE-CURIE COFUND programme U-Mobility, co-financed by the University of Málaga, the EC FP7 under GA No. 246550 and the Ministerio de  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.ijcip.2014.12.002">doi:10.1016/j.ijcip.2014.12.002</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/w5dkbi46sbdapgwiqnrrnclpte">fatcat:w5dkbi46sbdapgwiqnrrnclpte</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321020805/https://www.nics.uma.es/sites/default/files/papers/alcaraz%3A2015%3ACRI.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/aa/cb/aacbe802c824fe586414ff041fb87b471c23d89b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.ijcip.2014.12.002"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

D2.4 Threats Analysis and Integrated Security Framework for the IoRL Use Cases

Krzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Żórawski, John Cosmas, Nawar Jawad, Ben Meunier, Kareem Ali, Hongying Meng
<span title="2018-05-31">2018</span> <i title="Zenodo"> Zenodo </i> &nbsp;
In this report first, the threat analysis for the IoRL system and the specific use cases it is applied to are assessed.  ...  Based on the obtained results an Integrated Security Framework (ISF) is introduced as a countermeasure and its architecture is described in details.  ...  Network reconnaissance and DoS attacks A malicious device placed inside a smart home could connect to the network and perform network reconnaissance by enumerating devices connected to the network and  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.2579859">doi:10.5281/zenodo.2579859</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/k5a4ismuindapkj2hsmjovkgce">fatcat:k5a4ismuindapkj2hsmjovkgce</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200227132017/https://zenodo.org/record/2579859/files/IoRL%20Deliverable%20D2-4%20-%20Threats%20Analysis%20and%20Integrated%20Security%20Framework%20for%20the%20IoRL%20Use%20Cases.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/69/ca/69ca2162c181b92b4771d302fef1ec4228d5c1f3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.2579859"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

D2.1 5G Security: Current Status and Future Trends

Grant Millar, Anastasios Kafchitsas, Orestis Mavrooulos, Anastasios Kourtis, George Xilouris, Maria Christopoulou, Stavros Kolometsos, Edgardo Montes De Oca, Huu Nghia Nguyen, Antonio Pastor, Sonia Fernandez, Diego Lopez (+18 others)
<span title="2020-07-16">2020</span> <i title="Zenodo"> Zenodo </i> &nbsp;
It includes a summary of the 5G threat landscape, the 5G networks classification criteria and their threat taxonomy; a description of security requirements of 5G systems, divided into domain-specific use  ...  This deliverable aims to provide a basis for the identification of use cases and the development of 5G security enablers in INSPIRE-5Gplus.  ...  TEE shall also be used for data security and key exchanges as it is considered today with key pair transfer from a Security Manager and Security Agents (located inside VNFs).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.4569519">doi:10.5281/zenodo.4569519</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7aersbhzyrccrn563shazvj4dq">fatcat:7aersbhzyrccrn563shazvj4dq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210428092624/https://zenodo.org/record/4569519/files/i5-D2.1_5G%20Security%20Current%20Status%20and%20Future%20Trends_v1.6.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2e/60/2e60219b053e8e4983567f36352bd78d66ee3c04.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.4569519"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 369 results