Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis

SNG Gourisetti, M Mylrea, H Patangia - Future Generation Computer …, 2020 - Elsevier
… Therefore, it is important to have a comprehensive list of prioritized criteria in order to
determine the ideal cybersecurity posture; based on this complexity, the problem at hand is an …

Time-based gap analysis of cybersecurity trends in academic and digital media

MR Alagheband, A Mashatan, M Zihayat - ACM Transactions on …, 2020 - dl.acm.org
… to identify and detect news relating to cyber attacks to achieve a comprehensive perspective.
For instance, Abdullah et al. classified online news into several types of cyber attack news. …

Cyber Security Gap Analysis for Critical Energy Systems (CSGACES).

JE Stamp, JE Quiroz, A Ellis - 2017 - osti.gov
cyber security research & development (R&D) gap analysis and research plan to address
cyber security … perspective for the R&D planning and gap analysis. Investment will posture CES …

Cybersecurity vulnerability mitigation framework through empirical paradigm (CyFEr): prioritized gap analysis

SNG Gourisetti, M Mylrea, H Patangia - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
… Some frameworks, such as the cybersecurity capability maturity … ], can provide a detailed
cybersecurity analysis of a system, but … [13] “NIST cybersecurity framework gap analysis: Identify …

Analysis of cyber security knowledge gaps based on cyber security body of knowledge

C Catal, A Ozcan, E Donmez, A Kasif - Education and Information …, 2023 - Springer
gaps in cyber security graduates who join the cyber security workforce. We designed and
performed an opinion survey by using the Cyber Security … study, a comprehensive analysis was …

[HTML][HTML] Security in digital aeronautical communications a comprehensive gap analysis

N Mäurer, T Guggemos, T Ewert, T Gräupl… - International Journal of …, 2022 - Elsevier
cybersecurity measures in aeronautical communications system. We observe that most systems
have been thoroughly analyzed … concrete solutions to missing cybersecurity features. We …

Mirror mirror on the wall-what are cybersecurity educational games offering overall: A research study and gap analysis

A Chattopadhyay, C Maschinot… - 2021 IEEE Frontiers in …, 2021 - ieeexplore.ieee.org
… The first academic benchmark, as used in our conceptual taxonomy, is CSEC2017 [1],
which is a comprehensive curricular guide developed by the IEEE/ACM Joint Task Force on …

Bridging the Cybersecurity Gap: A Comprehensive Analysis of Threats to Power Systems, Water Storage, and Gas Network Industrial Control and Automation Systems

T Gueye, A Iqbal, Y Wang, RT Mushtaq, MI Petra - Electronics, 2024 - mdpi.com
This research addresses the dearth of real-world data required for effective neural network
model building, delving into the crucial field of industrial control and automation system (ICS) …

Cybersecurity Risk Analysis in the IoT: A Systematic Review

TS AlSalem, MA Almaiah, A Lutfi - Electronics, 2023 - mdpi.com
comprehensive analysis that contributes to the growing body of knowledge concerning IoT
cybersecurity… This study covered a gap regarding the risk management of IoT cybersecurity by …

A Gap Analysis of Implemented Barriers and Recommended Best Practices in Oil and Gas Cyber Security

E Høydal - 2020 - ntnuopen.ntnu.no
… addressed cyber security activities, it was discovered that the cyber security barrier elements
… Consequently, there is a need for further research to create a comprehensive cyber security