A quantitative bow-tie cyber risk classification and assessment framework

B Sheehan, F Murphy, AN Kia, R Kiely - Journal of Risk Research, 2021 - Taylor & Francis
Cyber-attacks pose a growing threat to global commerce that is increasingly reliant on digital
technology to conduct business. Traditional risk assessment and underwriting practices face …

Sdn-based detection of self-propagating ransomware: the case of badrabbit

FM Alotaibi, VG Vassilakis - Ieee Access, 2021 - ieeexplore.ieee.org
In the last decade, many ransomware attacks had the ability to spread within local networks
or even outside them. At the same time, software defined networking (SDN) has provided a …

Anomaly-based intrusion detection using tree augmented naive bayes

P Wester, F Heiding… - 2021 IEEE 25th …, 2021 - ieeexplore.ieee.org
Information technology is continuously becoming a more central part of society and together
with the increased connectivity and inter-dependency of devices, it is becoming more …

Development of the Concept of Cybersecurity of the Organization

AA Loishyn, S Hohoniants, M YaTkach… - TEM Journal, 2021 - ceeol.com
The article is of interest to managers and scientists at all levels who deal with combating
cyber threats. The study analyzed the security environment and confirmed the rapid growth …

Ransomware analysis using cyber kill chain

QKA Mirza, M Brown, O Halling… - 2021 8th International …, 2021 - ieeexplore.ieee.org
The havoc caused by ransomware in the recent past is far greater than any other form of
malware. Victims of this specific form of malware include, but not limited to; SMEs, large …

[HTML][HTML] A model for the evaluation of critical IT systems using multicriteria decision-making with elements for risk assessment

D Maček, I Magdalenić, N Begičević Ređep - Mathematics, 2021 - mdpi.com
One of the important objectives and concerns today is to find efficient means to manage the
information security risks to which organizations are exposed. Due to a lack of necessary …

Combating ransomware in internet of things: a games-in-games approach for cross-layer cyber defense and security investment

Y Zhao, Y Ge, Q Zhu - International Conference on Decision and Game …, 2021 - Springer
The recent surge in ransomware attacks has threatened many critical infrastructures such as
oil pipeline systems, hospitals, and industrial Internet of Things (IoT). Ransomware is a …

Analyze and designing low-cost network monitoring system using Icinga and Raspberry Pi

H Maulana - IOP Conference Series: Earth and Environmental …, 2021 - iopscience.iop.org
The development of information and data communication technology field in the world has
now increasingly led to the development of the Internet of Things devices. The development …

Analysis of the Effectiveness of Online Learning Using Eda Data Science and Machine Learning

H Maulana, AK Al-Khowarizmi - Sinkron: jurnal dan penelitian …, 2021 - jurnal.polgan.ac.id
In educational institutions, it is important to evaluate the performance of lecturers. One
aspect that can be used as a reference in assessing the performance of lecturers is the …

Penetration Testinga Saia Unit: A Control System for Water, Ventilation, and Heating in Smart Buildings

E Dzidic, B Jansson Mbonyimana - 2021 - diva-portal.org
Abstract The concept of Smart Buildings and automated processes is a growing trend. Due
to a rapidly growing market of buildings that relies on the Internet, improper security …