New approach for threat classification and security risk estimations based on security event management

JC Sancho, A Caro, M Ávila, A Bravo - Future Generation Computer …, 2020 - Elsevier
Abstract Security Information and Event Management (SIEM) systems are essential for
identifying cyber attacks, being an extended practice in organizations to detect threats …

Holistic strategy-based threat model for organizations

M Meinig, MIH Sukmana, KA Torkura… - Procedia Computer …, 2019 - Elsevier
Data breaches, privacy violations and cyber-attacks are growing problems for companies
and governmental organizations. Threat modelling serves as a heuristic procedure of …

A multidimensional approach towards a quantitative assessment of security threats

M Jouini, LBA Rabai, R Khedri - Procedia Computer Science, 2015 - Elsevier
Abstract Information security is the most challenging aspect of information processing.
Organizations, governments, and individuals are facing many information security risks …

Dynamic risk management response system to handle cyber threats

G Gonzalez-Granadillo, S Dubus, A Motzek… - Future Generation …, 2018 - Elsevier
Appropriate response strategies against new and ongoing cyber attacks must be able to
reduce risks down to acceptable levels, without sacrificing a mission for security. Existing …

AI-and metrics-based vulnerability-centric cyber security assessment and countermeasure selection

I Kotenko, E Doynikova, A Chechulin… - Guide to Vulnerability …, 2018 - Springer
This chapter considers methods and techniques for analytical processing of cyber security
events and information. The approach suggested in the chapter is based on calculating a set …

Managing vulnerabilities of information systems to security incidents

F Farahmand, SB Navathe, PH Enslow… - Proceedings of the 5th …, 2003 - dl.acm.org
Information security-conscious managers of organizations have the responsibility to advise
their senior management of the level of risks faced by the information systems. This requires …

Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases

G Sharma, S Vidalis, C Menon, N Anand - Multimedia Tools and …, 2023 - Springer
Proactive security plays a vital role in preventing the attack before entering active mode. In
the modern information environment, it depends on the vulnerability management …

Systematic analysis of automated threat modelling techniques: Comparison of open-source tools

D Granata, M Rak - Software Quality Journal, 2024 - Springer
Companies face increasing pressure to protect themselves and their customers from security
threats. Security by design is a proactive approach that builds security into all aspects of a …

Improving information security risk analysis by including threat-occurrence predictive models

PT Figueira, CL Bravo, JLR López - Computers & Security, 2020 - Elsevier
Protecting information is a crucial issue in today society, in both work and home
environments. Over the years, different tools and technologies have contributed to …

[PDF][PDF] Attack modeling and security evaluation in SIEM systems

I Kotenko, A Chechulin - International Transactions on Systems Science …, 2012 - siwn.org.uk
The paper suggests a framework for attack modeling and security evaluation in Security
Information and Event Management (SIEM) systems applicable for future systems of the …