Showing 21 - 28 results of 28 for search '"attack surface"', query time: 0.04s Refine Results
  1. 21

    Assessment of the Distributed Ledger Technology for Energy Sector Industrial and Operational Applications Using the MITRE ATT&CK® ICS Matrix by Annabelle Lee, Sri Nikhil Gupta Gourisetti, David Jonathan Sebastian-Cardenas, Kent Lambert, Vicente Navarro, Marco Pasetti, Umit Cali, Kateryna Isirova, Ramesh Reddi, Puica Nitu, Md. Touhiduzzaman, Michael Mylrea, Philip Huff, Farrokh Rahimi, Shammya Shananda Saha

    Published 2023-01-01
    “…However, the deployment of these technologies increases the overall attack surface. The MITRE ATT&CK® matrices have been developed to document an adversary’s tactics and techniques based on real-world observations. …”
    Get full text
    Article
  2. 22

    Research on security threat of intelligent connected vehicle by Yijie XUN, Jiajia LIU, Jing ZHAO

    Published 2019-12-01
    “…Intelligent connected vehicle (ICV) is becoming the mainstream of automotive industry in the future,and automobile safety has gradually become a problem that cannot be ignored in the automotive industry.The threat attack surfaces in ICV were analyzed in detail,and some representative attack methods were summarized.On this basis,a practical case of using the vulnerabilities of controller area network bus and telematics service provider to attack the Luxgen U5 car was discussed.The experimental results show that there are many attack surfaces that can be used in ICV.Finally,some feasible defensive measures against the threats in ICV were put forward.…”
    Get full text
    Article
  3. 23

    Enfouissement du témoignage et archivage oraculaire dans Oracle Night de Paul Auster by François Hugonnier

    Published 2017-12-01
    “…This article explores the inscription of historical testimony within fictional frames, by way of collage, fragmentation, ellipsis, chronological reshuffling and polyphonia, whose upshot is the broadening of the writer’s scope after 1945. Here the 9/11 attacks surface fleetingly, by way of a belated negative.…”
    Get full text
    Article
  4. 24

    AMTD:a way of adaptive moving target defense by Danjun LIU, Guilin CAI, Baosheng WANG

    Published 2018-01-01
    “…Moving target defense is a new way to change the asymmetry state between attack and defense,by dynamically moving target’s attacking surface.Frequency conversion of MTD is of great importance for the weighing between usability,security and defense cost.Nowadays,however,frequency conversion is usually determined by manager’s experience,which cannot create a balance between usability and security cost for the lack of theory basis.An adaptive moving target defense framework(AMTD)was proposed.AMTD can maximize system security at the lowest cost while ensuring that the system is available.The adaptability of AMTD has two modes.Firstly,the defense mode,it contains an adaptive conversion strategy to provide reacting defense triggered by security alerts and active defense triggered by timer expiration events.The other mode is the frequency conversion,which obtain the optimal conversion frequency by establishing mathematical models.Four series of simulation experiments were taken to verify the effectiveness of the solution.…”
    Get full text
    Article
  5. 25

    Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks by Sujash Naskar, Gerhard Hancke, Tingting Zhang, Mikael Gidlund

    Published 2025-01-01
    “…However, the openness of IoV networks and the exponential growth of V2X links have expanded potential attack surfaces, increasing the risk of security and privacy breaches. …”
    Get full text
    Article
  6. 26

    Safety of Systems Integrating Fire Protection Equipment – Risks, Gaps, Recommendations by Wojciech Wróblewski, Dorota Seliga

    Published 2024-12-01
    “…Project and methods: A detailed review of the literature and cybersecurity standards applicable to fire protection systems, such as NFPA 72, was conducted, from which key points that are vulnerable elements and represent attack surfaces were identified. The Cybersecurity for Fire Protection Systems report from a workshop held by the Research Foundation in 2021 was analysed. …”
    Get full text
    Article
  7. 27

    A Survey on Adversarial Attacks for Malware Analysis by Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Pradip Kunwar, Bhavani Thuraisingham

    Published 2025-01-01
    “…The work presents an in-depth threat model specific to adversarial malware evasion attacks, describing the unique attack surfaces of malware detectors and outlining adversarial goals tailored to the malware domain. …”
    Get full text
    Article
  8. 28

    The Risk of Escalating Cyberattacks and Financial Fraud During Wartime: The Maturity of The County's Judicial System in Combating Cyber and Financial Crimes by Hanna Yarovenko, Iryna Pozovna, Roman Bylbas

    Published 2024-12-01
    “…The rapid digitalization of financial systems and public services during the war has expanded attack surfaces, with cybercriminals exploiting vulnerabilities in digital banking platforms and cryptocurrency transactions. …”
    Get full text
    Article