[HTML][HTML] Learning from safety science: A way forward for studying cybersecurity incidents in organizations

N Ebert, T Schaltegger, B Ambuehl, L Schöni… - Computers & …, 2023 - Elsevier
In the aftermath of cybersecurity incidents within organizations, explanations of their causes
often revolve around isolated technical or human events such as an Advanced Persistent …

A master attack methodology for an AI-based automated attack planner for smart cities

G Falco, A Viswanathan, C Caldera, H Shrobe - IEEE Access, 2018 - ieeexplore.ieee.org
America's critical infrastructure is becoming “smarter” and increasingly dependent on highly
specialized computers called industrial control systems (ICS). Networked ICS components …

A review of game theory approach to cyber security risk management

DA Akinwumi, GB Iwasokun, BK Alese… - Nigerian Journal of …, 2017 - ajol.info
Cyber security is among the most complex and rapidly evolving issues and has been the
focus of present day organizations. Cyber security risk management is the process of …

Cybersafety: A system-theoretic approach to identify cyber-vulnerabilities & mitigation requirements in industrial control systems

S Khan, S Madnick - IEEE Transactions on Dependable and …, 2021 - ieeexplore.ieee.org
Recent cyber-physical attacks, such as Stuxnet, Triton etc., have invoked an ominous
realization about the vulnerability of critical infrastructure, including water, power and gas …

The human factor in cybersecurity: Robust & intelligent defense

JL Marble, WF Lawless, R Mittu, J Coyne… - Cyber Warfare: Building …, 2015 - Springer
In this chapter, we review the pervasiveness of cyber threats and the roles of both attackers
and cyber users (ie the targets of the attackers); the lack of awareness of cyber-threats by …

Cybersafety approach to cybersecurity analysis and mitigation for mobility-as-a-service and internet of vehicles

CW Lee, S Madnick - Electronics, 2021 - mdpi.com
Urban mobility is in the midst of a revolution, driven by the convergence of technologies
such as artificial intelligence, on-demand ride services, and Internet-connected and self …

Systematic approach to analyzing security and vulnerabilities of blockchain systems

JH Lee - 2019 - dspace.mit.edu
Recent hacks into blockchain systems and heists from such systems have raised serious
questions about whether this new technology can be secured from ongoing, evolving …

Cyber warfare conflict analysis and case studies

MB Gazula - 2017 - dspace.mit.edu
" The supreme art of war is to subdue the enemy without fighting."-Sun Tsu from" The Art of
War" Believed to have lived between 770 and 476 BC In the age of code wars, have our …

Cyber-attacks and their impact on real life: what are real-life cyber-attacks, how do they affect real life and what should we do about them?

P Chithaluru, R Tanwar, S Kumar - Information Security and …, 2020 - taylorfrancis.com
The internet has become an intrinsic part of human life in the modern era. Ranging from
online shopping to transportation, banking, social connectivity, etc. almost every element of …

A systems thinking for cybersecurity modeling

D Yan - arXiv preprint arXiv:2001.05734, 2020 - arxiv.org
Solving cybersecurity issues requires a holistic understanding of components, factors,
structures and their interactions in cyberspace, but conventional modeling approaches view …