Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Edward G. Amoroso"'
Autor:
Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian, Edward G. Amoroso
Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts attention from the defender environment to the attacker environment, offe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ab08170dfdb6cbbb0aada6da571df1d8
https://doi.org/10.1017/9781108869003
https://doi.org/10.1017/9781108869003
Autor:
Edward G. Amoroso
Public, private, and hybrid cloud services and infrastructure are shown to be vulnerable to a set of cybersecurity threats. Risk mitigation is best achieved through a variety of cybersecurity measures including cloud access security brokers, encrypti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::61200d324f3e7e86115ee0d5331df0f2
https://doi.org/10.1016/b978-0-12-803843-7.00064-8
https://doi.org/10.1016/b978-0-12-803843-7.00064-8
Autor:
Edward G. Amoroso
The concept of virtualization is shown to provide a means for securing computing and networking systems and infrastructure. Attention is required to secure the hypervisor for data center and wide area network applications. Virtual cybersecurity techn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bea386b98eed1678bbed1ad8790ea21d
https://doi.org/10.1016/b978-0-12-803843-7.00067-3
https://doi.org/10.1016/b978-0-12-803843-7.00067-3
Autor:
Edward G. Amoroso
Software-defined networking (SDN) and network function virtualization (NFV) technologies are outlined and are shown to require attention to avoid cascading threats as well for controller protections. Specific security advantages offered with SDN incl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::327921e4883354d318f3062806f13223
https://doi.org/10.1016/b978-0-12-803843-7.00068-5
https://doi.org/10.1016/b978-0-12-803843-7.00068-5
Autor:
Edward G. Amoroso, Jeffrey S. Bardin, Cataldo Basile, Stefan Berthold, Gerald Beuchelt, Rahul Bhaskar, Chiara Braghin, Albert Caballero, Matteo Maria Casalino, Erdal Cayirci, Thomas M. Chen, Hongbing Cheng, Lauren Collins, Marco Cremonini, Samuel J.J. Curry, Rozita Dara, Christopher Day, Sabrina De Capitani di Vimercati, Tewfiq El Maliki, Scott R. Ellis, Michael Erbschloe, Simone Fischer-Hbner, Sara Foresti, Errin W. Fulp, Angelo Genovese, Anna Granova, William F. Gross, Yong Guan, Cem Gurkok, Feng Hao, Tarfa Hamed, James T. Harmening, Rich Hoffman, Emin Huseynov, Markus Jakobsson, Ravi Jhawar, Almantas Kakareka, Bhushan Kapoor, Sokratis K. Katsikas, Dalia Khader, John Benjamin Khan, Larry Korba, Kameswari Kotapati, Stefan C. Kremer, Thomas F. LaPorta, Jean Lencrenon, Keith Lewis, Peng Liu, Giovanni Livraga, John R. Mallery, Bill Mansoor, Luther Martin, John McDonald, John McGowan, Nailah Mims, Simone Mutti, Peter F. Nicoletti, Kevin Noble, Pramod Pandya, Harsh Kupwade Patil, Stefano Paraboschi, Thea Peacock, Ken Perkins, Vincenzo Piuri, Henrik Plate, James Pooley, Chunming Rong, Robert Rounsavall, Peter Y.A. Ryan, Pierangela Samarati, Marco Santambrogio, Mario Santana, Steve Schneider, Fabio Scotti, Jean-Marc Seigneur, Marco Slaviero, Daniel S. Soper, Terence Spies, William Stallings, Alex Tsow, Jesse Walker, Michael A. West, Dan Wing, George O.M. Yee, Liang Yan, Roman Zabicki, Gansen Zhao, Zhe Zias
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::499603800871b1c5e5e1573afaf79d52
https://doi.org/10.1016/b978-0-12-803843-7.01002-4
https://doi.org/10.1016/b978-0-12-803843-7.01002-4
Autor:
Edward G. Amoroso
Publikováno v:
IEEE Cloud Computing. 1:28-38
Combining the various methods of securing the cloud infrastructure, services, and content can help meet or exceed the protection benefits of a traditional enterprise perimeter.
Autor:
Edward G. Amoroso
Publikováno v:
Network Security. 2011:10-16
In this excerpt from his book, Cyber Attacks: Protecting National Infrastructure, cyber-security expert Edward G Amoroso looks at how you detect infrastructure attacks, manage vulnerability information and manage risk. He examines the problems of rec
Publikováno v:
AT&T Technical Journal. 73:40-51
A system security engineering (SSE) methodology is used within the Secure Systems Engineering Department of AT&T Bell Laboratories during the analysis, design, and integration of computer and network systems. This evolving methodology focuses on how