© 2018 IEEE. Security metrics have become essential for assessing the security risks and making effective decisions concerning system security. Many security metrics rely on mathematical models, but are mainly based on empirical data, qualitative method, or compliance checking and this renders the outcome far from accurate. This paper proposes a novel approach to compute the probability distribution of cloud security threats based on Markov chain and Common Vulnerability Scoring System (CVSS). The paper gives an application on cloud systems to demonstrate the use of the proposed approach
© 2020 John Wiley & Sons, Ltd. The rapidly growing cloud computing paradigm provides a cost-effect...
In this paper, threat modeling issues in cyberphysical systems are discussed. First a generic model ...
Part 8: Risk Analysis and Security MetricsInternational audienceAssessing the vulnerability of large...
Copyright © 2019 Securing cyber infrastructures has become critical because they are increasingly ex...
This paper suggests a strategy (C5) for assessing cloud and IoT system (CIS) dependability, availabi...
Cloud computing has been one of the major emerging technologies in recent years. However, for ...
AbstractThis paper reviews the state of the art in cyber security risk assessment of Cloud Computing...
Analysis on Vulnerabilities and Vulnerability Life Cycle is at the core of Cybersecurity related stu...
Modern society relies on and profits from well-balanced computerized systems. Each of these systems ...
Modern society relies on and profits from well-balanced computerized systems. Each of these systems ...
Network security metrics allow quantitatively evaluating the overall resilience of networked systems...
Being in the era of information technology, importance and applicability of analytical statistical m...
Traditionally, risk assessment consists of evaluating the probability of "feared events", correspond...
In cloud computing, security risks posed to individual clients are different based on their specific...
Current vulnerability scoring mechanisms in complex cyber-physical systems (CPSs) face challenges in...
© 2020 John Wiley & Sons, Ltd. The rapidly growing cloud computing paradigm provides a cost-effect...
In this paper, threat modeling issues in cyberphysical systems are discussed. First a generic model ...
Part 8: Risk Analysis and Security MetricsInternational audienceAssessing the vulnerability of large...
Copyright © 2019 Securing cyber infrastructures has become critical because they are increasingly ex...
This paper suggests a strategy (C5) for assessing cloud and IoT system (CIS) dependability, availabi...
Cloud computing has been one of the major emerging technologies in recent years. However, for ...
AbstractThis paper reviews the state of the art in cyber security risk assessment of Cloud Computing...
Analysis on Vulnerabilities and Vulnerability Life Cycle is at the core of Cybersecurity related stu...
Modern society relies on and profits from well-balanced computerized systems. Each of these systems ...
Modern society relies on and profits from well-balanced computerized systems. Each of these systems ...
Network security metrics allow quantitatively evaluating the overall resilience of networked systems...
Being in the era of information technology, importance and applicability of analytical statistical m...
Traditionally, risk assessment consists of evaluating the probability of "feared events", correspond...
In cloud computing, security risks posed to individual clients are different based on their specific...
Current vulnerability scoring mechanisms in complex cyber-physical systems (CPSs) face challenges in...
© 2020 John Wiley & Sons, Ltd. The rapidly growing cloud computing paradigm provides a cost-effect...
In this paper, threat modeling issues in cyberphysical systems are discussed. First a generic model ...
Part 8: Risk Analysis and Security MetricsInternational audienceAssessing the vulnerability of large...