Skip to main content
Over the last years, Industrial Control Systems (ICS) have become increasingly exposed to a wide range of cyber-physical threats. Efficient models and techniques able to capture their complex structure and identify critical cyber-physical... more
    • by 
    •   6  
      Cyber-Physical SystemsCyber Physical SystemsSecurity MetricsIndustrial Control Systems
The quantitative assessment of security can help to analyze security qualitatively. The phase-wise discussion of security metrics provides a roadmap to the developers to estimate software security during various stages of software... more
    • by 
    •   5  
      Computer ScienceSoftware EngineeringSecurity MetricsEffectiveness Factor
Security metrics have received significant attention. However, they have not been systematically explored based on the understanding of attack-defense interactions, which are affected by various factors, including the degree of system... more
    • by 
    •   4  
      Computer ScienceSecurity MetricsCyber SecurityAcm
Developing secure web applications that can withstand malicious attacks requires a careful injection of security considerations into early stages of development lifecycle. Assessing security at the requirement analysis stage of the... more
    • by 
    •   7  
      Computer ScienceInformation TechnologySoftware SecuritySecurity Requirements
Security metrics support the value proposition of an organization’s security operation. Without compelling metrics, security professionals and their budgets continue largely on the intuition of company leadership. With metrics, the... more
    • by  and +1
    •   2  
      Security ManagementSecurity Metrics
Metrics are tools that are designed to facilitate decision-making and improve performance and accountability through collection, analysis, and reporting of relevant performance-related data. This paper provides an overview of the security... more
    • by 
    • Security Metrics
Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. However, lack of understanding and method to... more
    • by 
    •   7  
      Computer ScienceInformation SecurityNetwork SecurityComputer Security
— measuring information security is difficult; it is difficult to have one metrics that covers all types of devices. Security metrics is a standard used for measuring any organization's security. Good metrics are needed for analysts to... more
    • by 
    • Security Metrics
Security metrics have received significant attention. However, they have not been systematically explored based on the understanding of attack-defense interactions, which are affected by various factors, including the degree of system... more
    • by 
    •   2  
      Security MetricsCyber Security
—Automation of Enterprise Information Systems has resulted in several information security issues. There is a need to devise ways of measuring information security. Existing techniques mostly concentrate on finding ways of measuring... more
    • by 
    •   3  
      Security MetricsMetric SpacesEnterprise Information Systems
Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. However, lack of understanding and method to... more
    • by 
    •   7  
      Computer ScienceInformation SecurityNetwork SecurityComputer Security
The quantitative assessment of security can help to analyze security qualitatively. The phase-wise discussion of security metrics provides a roadmap to the developers to estimate software security during various stages of software... more
    • by 
    •   5  
      Computer ScienceSoftware EngineeringSecurity MetricsEffectiveness Factor
Performing risk assessment of computer networks is inevitable in the process of network hardening. To do efficient attack prevention, risk evaluation must be done in an accurate and quantitative manner. Such risk assessment requires... more
    • by 
    •   6  
      VulnerabilitySecurity MetricsIntrusion PreventionRisk Assessment
Design-level vulnerabilities are a main source of security risks in software. To improve the reliability of software design, this paper presents a modified threat-driven modeling framework, to determine which threats require mitigation... more
    • by 
    •   6  
      Software EngineeringRequirements EngineeringAspect Oriented Software DevelopmentSecurity Metrics
— Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems... more
    • by 
    •   5  
      ResilienceSecurity MetricsSelf HealingAdaptive Security
— Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems... more
    • by 
    •   5  
      ResilienceSecurity MetricsSelf HealingAdaptive Security
Discussion on measuring success in Defensive Cyberspace Operations.
    • by 
    •   2  
      MetricsSecurity Metrics
In recent years, Industrial Control Systems (ICS) have become an appealing target for cyber attacks, having massive destructive consequences. Security metrics are therefore essential to assess their security posture. In this paper, we... more
    • by 
    •   7  
      Network SecurityCyber Physical SystemsSecurity MetricsIndustrial Control Systems
Cyber-Physical Systems (CPS) often involve complex networks of interconnected software and hardware components that are logically combined to achieve a common goal or mission; for example, keeping a plane in the air or providing energy to... more
    • by 
    •   13  
      Computer ScienceSafety and reliability and risk managementSafetyAvionics
One of the key factors that endangers network security is software vulnerabilities. So, increasing growth of vulnerability emergence is a critical challenge in security management. Also, organizations constantly encounter the limited... more
    • by 
    •   7  
      RiskVulnerabilitySecurity MetricsImpact
—Moving data and applications to the cloud implies shifting their control from cloud consumers to the cloud service provider (CSP) indefinitely. Hence, the security and privacy (S&P) of the consumers' assets becomes an important issue.... more
    • by  and +2
    •   4  
      Cloud ComputingPrivacy and data protectionSecurity MetricsCloud Computing Security
— Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems... more
    • by 
    •   5  
      ResilienceSecurity MetricsSelf HealingAdaptive Security
In recent years, Industrial Control Systems (ICS) have become increasingly exposed to a wide range of cyber-physical attacks, having massive destructive consequences. Security metrics are therefore essential to assess and improve their... more
    • by 
    •   8  
      Cyber-Physical SystemsCybersecurityCyber Physical SystemsSecurity Metrics
This paper presents a MaxSAT benchmark focused on identifying critical nodes in AND/OR graphs. We use AND/OR graphs to model Industrial Control Systems (ICS) as they are able to semantically grasp intricate logical interdependencies among... more
    • by 
    •   7  
      Network SecurityBenchmarkingCyber Physical SystemsSecurity Metrics
— The emerging paradigm of cloud computing (CC) presents many security risks that can potentially and adversely impact any one of the plethora of stakeholders. The widespread deployment and service models of CC in addition to the wide... more
    • by  and +1
    •   6  
      Recommender SystemsCloud ComputingCloud Computing EconomyEconomics of Cloud Computing