The risk of exploiting information security vulnerabilities should not be determined solely by a single metric, such as the Common Vulnerability Scoring System (CVSS). This approach …
ZA Sheikh, Y Singh - 2022 Seventh International Conference …, 2022 - ieeexplore.ieee.org
The scope of Cyber Physical Systems (CPS) is extending from being utilized in ordinary applications to critical infrastructures like smart grids, smart transportation, etc. These …
H Ghani, J Luna, A Khelil, N Alkadri… - … Conference on Risks …, 2013 - ieeexplore.ieee.org
Multiple databases and repositories exist for collecting known vulnerabilities for different systems and on different levels. However, it is not unusual that extensive time elapses, in …
Threat intelligence is a domain within cybersecurity where teams leverage open source information to determine and prioritize threats to an organization. While commonly a …
Computer security has been a subject of serious study for at least 40 years, and a steady stream of innovations has improved our ability to protect networks and applications. But …
A Kumar, I Sharma - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Cybersecurity threats are targeted by unauthorized users for data stealing, manipulation, harming the reputation of another organization, and damaging the information system. A …
This research paper investigates the role of Artificial Intelligence (AI) and Machine Learning (ML) in Cybersecurity Threat Detection. With the increasing frequency and complexity of …
B Bokan, J Santos - 2022 Systems and Information Engineering …, 2022 - ieeexplore.ieee.org
The traditional threat modeling methodologies work well on a small scale, when evaluating targets such as a data field, a software application, or a system component–but they do not …
A Plaza, T Hayajneh - 2023 IEEE 14th Annual Ubiquitous …, 2023 - ieeexplore.ieee.org
Threat intelligence can be a valuable tool for any cybersecurity team. However, paid solutions are often costly. Furthermore, it is difficult to determine what solution is suitable for …