MITRE ATT&CK-driven cyber risk assessment

M Ahmed, S Panda, C Xenakis… - Proceedings of the 17th …, 2022 - dl.acm.org
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The MITRE …

A Data‐Driven Approach to Cyber Risk Assessment

P Santini, G Gottardi, M Baldi… - Security and …, 2019 - Wiley Online Library
Cyber Risk Assessment Based on HTMA In this section, we briefly describe the use of the
HTMA method for assessing cyber risk. We consider a set of n different cyber threats and, with …

Proactive Cyber Defense: Utilizing AI for Early Threat Detection and Risk Assessment

BR Maddireddy, BR Maddireddy - International Journal of Advanced …, 2020 - ijaeti.com
… (ML), deep learning (DL), and data analytics, this study aims to enhance organizations'
capabilities in identifying and mitigating cyber threats before they escalate into full-blown attacks. …

IoT cyber risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process

K Kandasamy, S Srinivas, K Achuthan… - EURASIP Journal on …, 2020 - Springer
… rise in the risk of potential cybersecurity threats. These cybersecurity threats impact the …
Therefore, healthcare systems need risk frameworks that can assess such risks due to IoT …

A review of threat analysis and risk assessment methods in the automotive context

G Macher, E Armengaud, E Brenner… - … Safety, Reliability, and …, 2016 - Springer
… up for the cybercyber-physical vehicle systems provides information and high-level principles
for automotive organizations to identify and assess cyber-security threats and design cyber

Threat analysis and risk assessment in automotive cyber security

D Ward, I Ibarra, A Ruddle - SAE International Journal of Passenger Cars …, 2013 - sae.org
… of cyber security, it is necessary to establish an analogous process of threat analysis and
risk assessment (T&R) in order to identify potential security attacks and the risk associated with …

[HTML][HTML] Future developments in cyber risk assessment for the internet of things

P Radanliev, DC De Roure, R Nicolescu, M Huth… - Computers in …, 2018 - Elsevier
… with other approaches and to combine companies’ own risk assessment with the supply
chain risk assessment. The main threat from applying the Exostar system is that the results …

Cyber-physical energy systems security: Threat modeling, risk assessment, resources, metrics, and case studies

I Zografopoulos, J Ospina, X Liu, C Konstantinou - IEEE Access, 2021 - ieeexplore.ieee.org
… Furthermore, we describe threat modeling and risk assessment methodologies and
discuss how they can support security studies by defining, preventing, and mitigating threats. …

Cyber threat: its origins and consequence and the use of qualitative and quantitative methods in cyber risk assessment

J Crotty, E Daniel - Applied Computing and Informatics, 2022 - emerald.com
… should adopt both a qualitative and quantitative cyber risk assessment approach. … the
constantly changing cyber threat landscape, the level of certainty in cyber risk assessment must …

[HTML][HTML] Assessing cyber threats for storyless systems

PH Meland, DA Nesheim, K Bernsmed… - Journal of Information …, 2022 - Elsevier
… 1, we initially developed the approach by combining and adapting existing techniques for
threat assessments. Our motivation for doing this was to perform internal risk assessment of …