2021 IEEE International Conference on Web Services (ICWS) 2021
DOI: 10.1109/icws53863.2021.00068
|View full text |Cite
|
Sign up to set email alerts
|

An Assurance-Based Risk Management Framework for Distributed Systems

Abstract: The advent of cloud computing and Internet of Things (IoT) has deeply changed the design and operation of IT systems, affecting mature concepts like trust, security, and privacy. The benefits in terms of new services and applications come at a price of new fundamental risks, and the need of adapting risk management frameworks to properly understand and address them. While research on risk management is an established practice that dates back to the 90s, many of the existing frameworks do not even come close to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(24 citation statements)
references
References 28 publications
0
24
0
Order By: Relevance
“…Together, these aspects highlight the critical importance of cutting-edge technology inclusive of deep gaining knowledge of (DL), gadget learning (ML), and user-targeted gadget getting to know structures in strengthening cybersecurity measures and responding to the ever-evolving cyber danger environment. Cagatay [24] noticed that the machine learning and deep studying have gained significance in malware detection, in particular in static evaluation that concentrates on facts extracted from every malware and valid code, inclusive of Windows API calls and Assembly commands. Static assessment techniques, leveraging more than a few classifier algorithms, frequently achieve immoderate tiers of accuracy, precision, and keep in mind exceeding 0.Nine, albeit they may be intrusive.…”
Section: Anomaly Based Detectionmentioning
confidence: 99%
“…Together, these aspects highlight the critical importance of cutting-edge technology inclusive of deep gaining knowledge of (DL), gadget learning (ML), and user-targeted gadget getting to know structures in strengthening cybersecurity measures and responding to the ever-evolving cyber danger environment. Cagatay [24] noticed that the machine learning and deep studying have gained significance in malware detection, in particular in static evaluation that concentrates on facts extracted from every malware and valid code, inclusive of Windows API calls and Assembly commands. Static assessment techniques, leveraging more than a few classifier algorithms, frequently achieve immoderate tiers of accuracy, precision, and keep in mind exceeding 0.Nine, albeit they may be intrusive.…”
Section: Anomaly Based Detectionmentioning
confidence: 99%
“…This is because it typically uses an optimization technique belonging to the hill-climbing Newton family, such as Newton-Raphson and its variants and extensions, to arrive at an estimate. Therefore, it appears that the conventional logistic regression has difficulty managing a large range of features [23]. When building a machine learning model, feature selection is used to narrow down the data points to a manageable collection.…”
Section: Fig 1: Malware Analysis In Cloudmentioning
confidence: 99%
“…Non-functional properties mimics Protection Profiles of CC [25]. They have been mostly considered in the context of service certification [2] and later enhanced in the context of cloud certification [3,34,43], cloud plan adaption [6], DevOps pipelines [4], and to complement and validate risk management [1].…”
Section: Motivation and Reference Scenario 21 Motivation And State Of...mentioning
confidence: 99%
“…The monetary costs are finally calculated assuming an average hourly labour cost of 23€ in Spain. 1 We note that, for simplicity, costs related to the adoption of services and infrastructures have been assumed to be negligible; more sophisticated cost models can be applied in our methodology.…”
Section: Walkthroughmentioning
confidence: 99%