Mechanism to continue system availability during cyber threat scenario
It is known that cyber attacks on the application systems causes denial of services to avoid confidentiality and integrity compromise. The system remains inaccessible until it is completely recovered from that threat. This unavailability of the system is very important to handle as it results in hug...
Saved in:
Main Authors: | Safdar, S., Akbar, R., Hassan, M.F., Sharef, B.T., Hajjar, K., Qureshi, M.A. |
---|---|
Format: | Article |
Published: |
Association for Computing Machinery, Inc
2017
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85015220910&doi=10.1145%2f3022227.3022318&partnerID=40&md5=cb087f6b180570530db87e00bf2bb95b http://eprints.utp.edu.my/20250/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
AD HOC DATA MIGRATION FOR MAINTAINING SYSTEM AVAILABILITY
DURING CYBER THREAT
by: SAFDAR, SOHAIL
Published: (2015) -
AD HOC DATA MIGRATION FOR MAINTAINING SYSTEM AVAILABILITY
DURING CYBER THREAT
by: SAFDAR, SOHAIL
Published: (2016) -
Framework for Alternate Execution of Workflows Under Threat
by: Safdar, S., et al.
Published: (2010) -
Cyber-attack features for detecting cyber threat incidence from online news
by: Abdullah, M. S., et al.
Published: (2019) -
Threat analysis for cyber physical system
by: Ahmed Al-Mhiqani, Mohammed Nasser
Published: (2015)