Mechanism to continue system availability during cyber threat scenario
It is known that cyber attacks on the application systems causes denial of services to avoid confidentiality and integrity compromise. The system remains inaccessible until it is completely recovered from that threat. This unavailability of the system is very important to handle as it results in hug...
Saved in:
| Main Authors: | Safdar, S., Akbar, R., Hassan, M.F., Sharef, B.T., Hajjar, K., Qureshi, M.A. |
|---|---|
| Format: | Article |
| Institution: | Universiti Teknologi Petronas |
| Record Id / ISBN-0: | utp-eprints.20250 / |
| Published: |
Association for Computing Machinery, Inc
2017
|
| Online Access: |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85015220910&doi=10.1145%2f3022227.3022318&partnerID=40&md5=cb087f6b180570530db87e00bf2bb95b http://eprints.utp.edu.my/20250/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
AD HOC DATA MIGRATION FOR MAINTAINING SYSTEM AVAILABILITY
DURING CYBER THREAT
by: SAFDAR, SOHAIL
Published: (2015) -
Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing
by: Saboor, A., et al.
Published: (2022) -
Context and machine learning based trust management framework for internet of vehicles
by: Rehman, A., et al.
Published: (2021) -
Sentiment Analysis of Reviews in Natural Language: Roman Urdu as a Case Study
by: Qureshi, M.A., et al.
Published: (2022) -
Software development process tailoring for small and medium sized companies
by: Akbar, R., et al.
Published: (2014)