Search
Now showing items 1-4 of 4
A finite state hidden markov model for predicting multistage attacks in cloud systems
(
IEEE
, 2014 , Conference Paper)
Cloud computing significantly increased the security threats because intruders can exploit the large amount of cloud resources for their attacks. However, most of the current security technologies do not provide early ...
A hierarchical, autonomous, and forecasting cloud IDS
(
IEEE
, 2013 , Conference Paper)
Cloud computing supports distributed service oriented paradigm, multi-domain and multi-users administrative infrastructure. Due to the distributed nature of the cloud environment, it has high intrusion prospects and suspect ...
HA-CIDS: A hierarchical and autonomous IDS for cloud systems
(
IEEE
, 2013 , Conference Paper)
Cloud computing is an attractive model that provides the delivery of on-demand computing resources over the Internet and on a pay-for-use basis. However, while intruders may exploit clouds for their advantage, most IDS ...
Cyber LOPA: An Integrated Approach for the Design of Dependable and Secure Cyber-Physical Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Safety risk assessment is an essential process to ensure a dependable cyber-physical system (CPS) design. Traditional risk assessment considers only physical failures. For modern CPSs, failures caused by cyber attacks are ...