3.8 Proceedings Paper

An Assurance-Based Risk Management Framework for Distributed Systems

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification

Marco Anisetti et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Computer Science, Information Systems

FoNAC - An automated Fog Node Audit and Certification scheme

Mudassar Aslam et al.

COMPUTERS & SECURITY (2020)

Review Engineering, Industrial

Applications of machine learning methods for engineering risk assessment - A review

Jeevith Hegde et al.

SAFETY SCIENCE (2020)

Proceedings Paper Computer Science, Information Systems

Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems

Marco Anisetti et al.

PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1 (2020)

Article Computer Science, Information Systems

IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process

Kamalanathan Kandasamy et al.

EURASIP JOURNAL ON INFORMATION SECURITY (2020)

Article Multidisciplinary Sciences

Future developments in standardisation of cyber risk in the Internet of Things (IoT)

Petar Radanliev et al.

SN APPLIED SCIENCES (2020)

Article Computer Science, Hardware & Architecture

Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices

Sara N. Matheu-Garcia et al.

COMPUTER STANDARDS & INTERFACES (2019)

Article Computer Science, Information Systems

Hierarchical Flow Model-Based Impact Assessment of Cyberattacks for Critical Infrastructures

Qianxiang Zhu et al.

IEEE SYSTEMS JOURNAL (2019)

Article Computer Science, Information Systems

Data-Driven Cybersecurity Incident Prediction: A Survey

Nan Sun et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Security Risk Assessment in Internet of Things Systems

Jason R. C. Nurse et al.

IT PROFESSIONAL (2017)

Proceedings Paper Computer Science, Information Systems

RiskTeller: Predicting the Risk of Cyber Incidents

Leyla Bilge et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Information Systems

Taxonomy of information security risk assessment (ISRA)

Alireza Shameli-Sendi et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Theory & Methods

From Security to Assurance in the Cloud: A Survey

Claudio A. Ardagna et al.

ACM COMPUTING SURVEYS (2015)

Review Computer Science, Information Systems

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

Barbara Kordy et al.

COMPUTER SCIENCE REVIEW (2014)

Article Computer Science, Hardware & Architecture

Cloud monitoring: A survey

Giuseppe Aceto et al.

COMPUTER NETWORKS (2013)

Article Computer Science, Theory & Methods

DARGOS: A highly adaptable and scalable monitoring architecture for multi-tenant Clouds

Javier Povedano-Molina et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)

Article Computer Science, Artificial Intelligence

Risk analysis in a linguistic environment: A fuzzy evidential reasoning-based approach

Yong Deng et al.

EXPERT SYSTEMS WITH APPLICATIONS (2011)

Article Engineering, Electrical & Electronic

Toward an Architecture for Monitoring Private Clouds

Shirlei Aparecida de Chaves et al.

IEEE COMMUNICATIONS MAGAZINE (2011)