Privacy-preserving cybersecurity information exchange mechanism

I Vakilinia, DK Tosh, S Sengupta - … International Symposium on …, 2017 - ieeexplore.ieee.org
Cybersecurity information sharing is improving cyber incident detection and prevention by
reducing the loss caused by attacks and eliminating the costs of duplication efforts for cyber …

Thinking, fast and slow: Combining vector spaces and knowledge graphs

S Mittal, A Joshi, T Finin - arXiv preprint arXiv:1708.03310, 2017 - arxiv.org
Knowledge graphs and vector space models are robust knowledge representation
techniques with individual strengths and weaknesses. Vector space models excel at …

3-way game model for privacy-preserving cybersecurity information exchange framework

I Vakilinia, DK Tosh, S Sengupta - MILCOM 2017-2017 IEEE …, 2017 - ieeexplore.ieee.org
With the growing number of cyberattack incidents, organizations are required to have
proactive knowledge on the cybersecurity landscape for efficiently defending their …

A coalitional game theory approach for cybersecurity information sharing

I Vakilinia, S Sengupta - MILCOM 2017-2017 IEEE Military …, 2017 - ieeexplore.ieee.org
As the complexity and number of cybersecurity incidents are growing, the traditional security
measures are not sufficient to defend against attackers. In this situation, cyber threat …

Attribute based sharing in cybersecurity information exchange framework

I Vakilinia, DK Tosh, S Sengupta - … International Symposium on …, 2017 - ieeexplore.ieee.org
As the complexity of the cyber attacks are increasing, there is a growing demand for
proactive defense against them. CYBersecurity information EXchange (CYBEX) is playing a …

Risk management using cyber-threat information sharing and cyber-insurance

DK Tosh, S Shetty, S Sengupta, JP Kesan… - … conference on game …, 2017 - Springer
Critical infrastructure systems spanning from transportation to nuclear operations are
vulnerable to cyber attacks. Cyber-insurance and cyber-threat information sharing are two …

Three layer game theoretic decision framework for cyber-investment and cyber-insurance

DK Tosh, I Vakilinia, S Shetty, S Sengupta… - Decision and Game …, 2017 - Springer
Cyber-threat landscape has become highly complex, due to which isolated attempts to
understand, detect, and resolve cybersecurity issues are not feasible in making a time …

[PDF][PDF] High-Level Self-Sustaining Information Security Management Framework.

L Kauspadiene, A Cenys, N Goranin, S Tjoa… - Baltic Journal of …, 2017 - bjmc.lu.lv
This paper is aimed to provide the inclusive approach of collaborative information security
management framework architectural reference model. Integration and performance based …

An evolution roadmap for community cyber security information sharing maturity model

W Zhao, G White - 2017 - scholarspace.manoa.hawaii.edu
Cyber security has become one of the most important challenges, which is especially true for
communities. A community generally consists of all of the entities within a geographical …

Evolving sharing strategies in cybersecurity information exchange framework

I Vakilinia, SJ Louis, S Sengupta - Proceedings of the Genetic and …, 2017 - dl.acm.org
Cybersecurity information sharing among participating organizations proactivly helps defend
against attackers. However, such sharing also exposes potentially sensitive organizational …