Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Mark B. Josephs"'
Publikováno v:
ARES
This paper introduces an “Indicator of Risk (IoR) Library” that leverages the MITRE ATT&CK for Industrial Control Systems (ICS) knowledge base to support continuous risk monitoring. This allows also making use of variables that are already being
Publikováno v:
TrustCom
We tackle the problem of sharing eHealth data across different jurisdictions. As a general rule, and due to the sensitive nature of the information, different national regulations impose severe limits on what can be exchanged, even in case of emergen
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030415679
CRiSIS
CRiSIS
Emergent cyber-attacks and exploits targeting Operational Technologies (OT) call for a proactive risk management approach. The convergence between OT and the Internet-of-Things in industries introduces new opportunities for cyber-attacks that have th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::618f4b5662d58421f2b3ca88e3529285
https://doi.org/10.1007/978-3-030-41568-6_3
https://doi.org/10.1007/978-3-030-41568-6_3
Publikováno v:
ISMICT
Cybersecurity incidents are on the rise in the health-care sector and it is becoming a growing concern for the senior executives. The attack surface is expanding due to the large number of connected medical devices and the proliferation of portable d
Publikováno v:
EDUCON
Lack of skilled digital forensic professionals is seriously affecting the everyday life of everyone as businesses and law enforcement are struggling to fill the bare minimum number of digital investigator positions. This skills shortage can hinder in
Publikováno v:
Smart Blockchain ISBN: 9783030340827
SmartBlock
SmartBlock
Auditing operations in multi-party data exchange, and over an arbitrary topology, is a common requirement yet still an open problem especially in the case where no trust on any participating party can be presumed. The challenges range from storage of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::65ce6fd00505f6b1b32a14a9b8bd01bb
https://doi.org/10.1007/978-3-030-34083-4_5
https://doi.org/10.1007/978-3-030-34083-4_5
Publikováno v:
ECSA (Companion)
Existing security technologies play a significant role in protecting enterprise systems but they are no longer enough on their own given the number of successful cyberattacks against businesses and the sophistication of the tactics used by attackers
Publikováno v:
ICETE (1)
Scopus-Elsevier
Scopus-Elsevier
In recent years, several cases of DDoS attacks using IoT botnets have been reported, including the largest DDoS known, caused by the malware Mirai in 2016. The infection of the IoT devices could have been prevented with basic security hygiene, but as
Publikováno v:
Developments in Language Theory ISBN: 9783319986531
ISC
ISC
Continuous risk monitoring is considered in the context of cybersecurity management for the Industrial Internet-of-Thing. Cyber-risk management best practice is for security controls to be deployed and configured in order to bring down risk exposure
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ad4a34c6c02f8efcf96c846c80708792
https://doi.org/10.1007/978-3-319-99136-8_27
https://doi.org/10.1007/978-3-319-99136-8_27
Autor:
C. Tully, Z. H. Luo, Mark B. Josephs, M. Lloyd, M. Jackson, G. Sharman, D. Crocker, Guy Haworth, A. Turner, C. Jones, M. Holcombe
Publikováno v:
The Computer Journal. 50:261-268