A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces

L Zhang, A Taal, R Cushing, C de Laat… - International Journal of …, 2022 - Springer
Security is a top concern in digital infrastructure and there is a basic need to assess the level
of security ensured for any given application. To accommodate this requirement, we propose …

A survey on threat-modeling techniques: protected objects and classification of threats

A Konev, A Shelupanov, M Kataev, V Ageeva… - Symmetry, 2022 - mdpi.com
Information security is one of the most important attributes of distributed systems that often
operate on unreliable networks. Enabling security features during the development of a …

A model of threats to the confidentiality of information processed in cyberspace based on the information flows model

NS Egoshin, AA Konev, AA Shelupanov - Symmetry, 2020 - mdpi.com
This article covers one of the fundamental problems of information security—building a
threat model. The article discusses a new method for identifying typical threats to information …

ASATM: Automated security assistant of threat models in intelligent transportation systems

MA Ramazanzadeh, B Barzegar… - IET Computers & Digital …, 2022 - Wiley Online Library
The evolution of technology has led to the appearance of smart cities. An essential element
in such cities is smart mobility that covers the subjects related to Intelligent Transportation …

Big data for personalized healthcare

R Dhanalakshmi, J Anand - Handbook of Intelligent Healthcare …, 2022 - Wiley Online Library
Big data has turned radically into a technological development that has been applied more
often in biomedical healthcare research than earlier. The unparalleled developments in …

Threat Modeling and Assessment Methods in the Healthcare-IT System: A Critical Review and Systematic Evaluation

M Aijaz, M Nazir, MNA Mohammad - SN Computer Science, 2023 - Springer
In recent years, the healthcare-IT systems have undergone numerous technological
advancements. With the advent of implanted medical devices, the ubiquitous health is …

A review on security issues in healthcare cyber-physical systems

VS Abhijith, B Sowmiya, S Sudersan… - Cyber Intelligence and …, 2022 - Springer
The rapid advancements in computation methodologies and cloud computing along with the
rapid expansion of the Internet of things have resulted in tremendous advancements in …

Mitigating security threats through the use of security tactics to design secure cyber-physical systems (CPS)

C Orellana, MM Villegas, H Astudillo - Proceedings of the 13th …, 2019 - dl.acm.org
Cyber-Physical Systems (CPS) attract growing interest from architects and attackers, given
their potential effect on privacy and safety of ecosystems and users. Architectural tactics …

Model of Threats to the Integrity and Availability of Information Processed in Cyberspace

NS Egoshin, AA Konev, AA Shelupanov - Symmetry, 2023 - mdpi.com
Depending on their motivation, offenders have different goals, and disclosure of information
is not always such a goal. It often happens that the purpose of the offender is to disrupt the …

Risk management for CPS security

S Ali, T Al Balushi, Z Nadir, OK Hussain, S Ali… - Cyber Security for Cyber …, 2018 - Springer
As cyber-physical systems combine physical systems with the cyber domain, to safeguard
the communication medium and address the growing security issues, a well-designed risk …