A security review of local government using NIST CSF: a case study (English)
- New search for: Ibrahim, Ahmed
- Further information on Ibrahim, Ahmed:
- https://orcid.org/0000-0002-4760-3533
- New search for: Valli, Craig
- New search for: McAteer, Ian
- New search for: Chaudhry, Junaid
- New search for: Ibrahim, Ahmed
- Further information on Ibrahim, Ahmed:
- https://orcid.org/0000-0002-4760-3533
- New search for: Valli, Craig
- New search for: McAteer, Ian
- New search for: Chaudhry, Junaid
In:
The Journal of Supercomputing
;
74
, 10
; 5171-5186
;
2018
-
ISSN:
- Article (Journal) / Print
-
Title:A security review of local government using NIST CSF: a case study
-
Contributors:Ibrahim, Ahmed ( author ) / Valli, Craig ( author ) / McAteer, Ian ( author ) / Chaudhry, Junaid ( author )
-
Published in:The Journal of Supercomputing ; 74, 10 ; 5171-5186
-
Publisher:
- New search for: Springer US
- New search for: Springer
-
Place of publication:New york, NY
-
Publication date:2018
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 770/3155
- New search for: 54.20
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents – Volume 74, Issue 10
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 4865
-
Threats to critical infrastructure from AI and human intelligenceChaudhry, Junaid / Pathan, Al-Sakib Khan / Rehmani, Mubashir Husain / Bashir, Ali Kashif et al. | 2018
- 4867
-
A machine learning approach for feature selection traffic classification using security analysisShafiq, Muhammad / Yu, Xiangzhan / Bashir, Ali Kashif / Chaudhry, Hassan Nazeer / Wang, Dawei et al. | 2018
- 4893
-
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructuresYang, Wencheng / Wang, Song / Zheng, Guanglou / Chaudhry, Junaid / Valli, Craig et al. | 2018
- 4910
-
Real-time identification of three Tor pluggable transports using machine learning techniquesSoleimani, Mohammad Hassan Mojtahed / Mansoorizadeh, Muharram / Nassiri, Mohammad et al. | 2018
- 4928
-
Cyber security methods for aerial vehicle networks: taxonomy, challenges and solutionSedjelmaci, Hichem / Senouci, Sidi Mohamed et al. | 2018
- 4945
-
Chain-based big data access control infrastructureSifah, Emmanuel Boateng / Xia, Qi / Agyekum, Kwame Opuni-Boachie Obour / Amofa, Sandro / Gao, Jianbin / Chen, Ruidong / Xia, Hu / Gee, James C. / Du, Xiaojiang / Guizani, Mohsen et al. | 2018
- 4965
-
Identifying critical autonomous systems in the InternetNur, Abdullah Yasin / Tozal, Mehmet Engin et al. | 2018
- 4986
-
Security threats to critical infrastructure: the human factorGhafir, Ibrahim / Saleem, Jibran / Hammoudeh, Mohammad / Faour, Hanan / Prenosil, Vaclav / Jaf, Sardar / Jabbar, Sohail / Baker, Thar et al. | 2018
- 5003
-
Towards ontology-based multilingual URL filtering: a big data problemHussain, Mubashar / Ahmed, Mansoor / Khattak, Hasan Ali / Imran, Muhammad / Khan, Abid / Din, Sadia / Ahmad, Awais / Jeon, Gwanggil / Reddy, Alavalapati Goutham et al. | 2018
- 5022
-
SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networksUbaid, Saqib / Shafeeq, M. Farrukh / Hussain, Majid / Akbar, Ali Hammad / Abuarqoub, Abdelrahman / Zia, M. Sultan / Abbas, Beenish et al. | 2018
- 5041
-
Infrequent pattern mining in smart healthcare environment using data summarizationAhmed, Mohiuddin / Barkat Ullah, Abu S. S. M. et al. | 2018
- 5060
-
Forensic investigation to detect forgeries in ASF files of contemporary IP camerasKhan, Rashid Masood / Iqbal, Waseem / Amjad, Muhammad Faisal / Abbas, Haider / Afzal, Hammad / Rauf, Abdul / Pasha, Maruf et al. | 2018
- 5082
-
CDCSS: cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber attacksMirza, Muhammad Ayzed / Ahmad, Mudassar / Habib, Muhammad Asif / Mahmood, Nasir / Faisal, C. M. Nadeem / Ahmad, Usman et al. | 2018
- 5099
-
Next-generation cybersecurity through a blockchain-enabled federated cloud frameworkMalomo, Olumide O. / Rawat, Danda B. / Garuba, Moses et al. | 2018
- 5127
-
An efficient approach for publishing microdata for multiple sensitive attributesAnjum, Adeel / Ahmad, Naveed / Malik, Saif U. R. / Zubair, Samiya / Shahzad, Basit et al. | 2018
- 5156
-
NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacksMehmood, Amjad / Mukherjee, Mithun / Ahmed, Syed Hassan / Song, Houbing / Malik, Khalid Mahmood et al. | 2018
- 5171
-
A security review of local government using NIST CSF: a case studyIbrahim, Ahmed / Valli, Craig / McAteer, Ian / Chaudhry, Junaid et al. | 2018
- 5187
-
Confidential smart-sensing framework in the IoT eraAl-Turjman, Fadi / Alturjman, Sinem et al. | 2018
- 5199
-
Multi-tenant intrusion detection system for public cloud (MTIDS)Hawedi, Mohamed / Talhi, Chamseddine / Boucheneb, Hanifa et al. | 2018
- 5231
-
A low cost wearable wireless sensing system for paretic hand management after strokeMin, Se-Dong / Wang, Chang-Won / Lee, Hwa-Min / Jung, Bong-Keun et al. | 2016
- 5241
-
Modeling SmallClient indexing framework for big data analyticsSiddiqa, Aisha / Karim, Ahmad / Chang, Victor et al. | 2017
- 5263
-
Multi-queue scheduling of heterogeneous jobs in hybrid geo-distributed cloud environmentChunlin, Li / Jianhang, Tang / Youlong, Luo et al. | 2018
- 5293
-
Design of DRAM-NAND flash hybrid main memory and Q-learning-based prefetching methodYoon, Su-Kyung / Youn, Young-Sun / Kim, Jeong-Geun / Kim, Shin-Dug et al. | 2018
- 5314
-
An optimization framework for the capacity allocation and admission control of MapReduce jobs in cloud systemsMalekimajd, M. / Ardagna, D. / Ciavotta, M. / Gianniti, E. / Passacantando, M. / Rizzi, A. M. et al. | 2018
- 5349
-
A hybrid data replication strategy with fuzzy-based deletion for heterogeneous cloud data centersMansouri, N. / Javidi, M. M. et al. | 2018
- 5373
-
Acknowledgment-based punishment and stimulation scheme for mobile ad hoc networkBounouni, Mahdi / Bouallouche-Medjkoune, Louiza et al. | 2018
- 5399
-
E-OSched: a load balancing scheduler for heterogeneous multicoresKhalid, Yasir Noman / Aleem, Muhammad / Prodan, Radu / Iqbal, Muhammad Azhar / Islam, Muhammad Arshad et al. | 2018
- 5432
-
Optimizing inter-nest data locality in imperfect stencils based on loop blockingSeyfari, Yousef / Lotfi, Shahriar / Karimpour, Jaber et al. | 2018
- 5461
-
Prediction of air travel demand using a hybrid artificial neural network (ANN) with Bat and Firefly algorithms: a case studyMostafaeipour, Ali / Goli, Alireza / Qolipour, Mojtaba et al. | 2018
- 5485
-
Virtual sensor as a service: a new multicriteria QoS-aware cloud service composition for IoT applicationsKhansari, Mina Emami / Sharifian, Saeed / Motamedi, Seyed Ahmad et al. | 2018
- 5513
-
Continuous memory allocation model for cloud servicesAlyatama, Anwar / Alsumait, Asmaa / Alotaibi, Maryam et al. | 2018
- 5539
-
A stochastic link-fault-tolerant routing algorithm in folded hypercubesThuan, Bui Thi / Ngoc, Lam Boi / Kaneko, Keiichi et al. | 2018
- 5558
-
CWBound: boundary node detection algorithm for complex non-convex mobile ad hoc networksCheong, Se-Hang / Si, Yain-Whar et al. | 2018
- 5578
-
PL-DVFS: combining Power-aware List-based scheduling algorithm with DVFS technique for real-time tasks in Cloud ComputingSafari, Monireh / Khorsand, Reihaneh et al. | 2018
- 5601
-
Improving NMF-based community discovery using distributed robust nonnegative matrix factorization with SimRank similarity measureHe, Chaobo / Fei, Xiang / Li, Hanchao / Tang, Yong / Liu, Hai / Liu, Shuangyin et al. | 2018