Understanding and recommending security requirements from problem domain ontology: A cognitive three-layered approach

BJ Kim, SW Lee - Journal of Systems and Software, 2020 - Elsevier
Socio-technical systems (STS) are inherently complex due to the heterogeneity of its
intertwined components. Therefore, ensuring STS security continues to pose significant …

Key Challenges and Limitations of the OSINT Framework in the Context of Cybersecurity

D Govardhan, GGSH Krishna, V Charan… - … Conference on Edge …, 2023 - ieeexplore.ieee.org
In today's world, Open-Source Intelligence (OSINT) has gained popularity as a method of
gathering data, both for cyber-attacks and detecting cyber threats. It involves using publicly …

Call to action: Mobilizing community discussion to improve information-sharing about vulnerabilities in industrial control systems and critical infrastructure

D Kapellmann, R Washburn - 2019 11th International …, 2019 - ieeexplore.ieee.org
Vulnerability management remains a significant challenge for organizations that handle
critical infrastructure worldwide. Hallmark cyber-physical incidents with disruptive and …

Cybersecurity incident response: a socio-technical approach

B Al Sabbagh - 2019 - diva-portal.org
This thesis examines the cybersecurity incident response problem using a socio-technical
approach. The motivation of this work is the need to bridge the knowledge and practise gap …

Judgment call the game: Using value sensitive design and design fiction to surface ethical concerns related to technology

S Ballard, KM Chappell, K Kennedy - Proceedings of the 2019 on …, 2019 - dl.acm.org
Artificial intelligence (AI) technologies are complex socio-technical systems that, while
holding much promise, have frequently caused societal harm. In response, corporations …

Privacy concerns and acceptance factors of osint for cybersecurity: A representative survey

T Riebe - Technology Assessment of Dual-Use ICTs: How to …, 2023 - Springer
Abstract The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity
threats is gaining popularity among many organizations. This is especially relevant to …

[图书][B] Information pooling bias in collaborative cyber forensics

P Rajivan - 2014 - search.proquest.com
Cyber threats are growing in number and sophistication making it important to continually
study and improve all dimensions of cyber defense. Human teamwork in cyber defense …

Determining system requirements for human-machine integration in cyber security incident response

MM Nyre-Yu - 2019 - search.proquest.com
In 2019, cyber security is considered one of the most significant threats to the global
economy and national security. Top US agencies have acknowledged this fact, and …

How national CSIRTs leverage public data, OSINT and free tools in operational practices: An empirical study

SRBM Kassim, S Li, B Arief - Cyber Security: A Peer-Reviewed …, 2022 - ingentaconnect.com
Computer security incident response teams (CSIRTs) have been established at national and
organisational levels to coordinate responses to computer security incidents. It is known that …

Development of a semantic-enabled cybersecurity threat intelligence sharing model

JS Mtsweni, NA Shozi, K Matenche, M Mutemwa… - 2016 - researchspace.csir.co.za
Big Data is transforming the global technological landscape by elevating online information
access required for addressing everyday challenges, such as detecting in real-time the …