[PDF][PDF] Building an Ontology of Cyber Security.

A Oltramari, LF Cranor, RJ Walls, PD McDaniel - STIDS, 2014 - Citeseer
Situation awareness depends on a reliable perception of the environment and
comprehension of its semantic structures. In this respect, cyberspace presents a unique …

[图书][B] Doing security

M Button - 2008 - Springer
Security is an important issue. It is important to a domestic householder who doesn't want to
be burgled, to a corporation suffering losses from staff pilferage, to governments fearing …

Use of cyber attack and defense agents in cyber ranges: A case study

MM Yamin, B Katt - Computers & Security, 2022 - Elsevier
With the ever-changing cybersecurity landscape, the need for a continuous training for new
cybersecurity skill sets is a requirement. Such continuous training programs can be …

Cyberspace: a digital ecosystem

KJ Lippert, R Cloutier - Systems, 2021 - mdpi.com
Cyberspace is a new frontier, not just for hackers, but for engineers. It is a digital ecosystem,
the next generation of Internet and network applications, promising a whole new world of …

Complexity Science and Cyber Operations: A Literature Survey

B Becote, BP Rimal - Complex System Modeling and …, 2023 - ieeexplore.ieee.org
Complexity science is an interdisciplinary scientific field that analyzes systems as holistic
entities consisting of characteristics beyond the sum of a system's individual elements. This …

[PDF][PDF] Parallel big data processing system for security monitoring in Internet of Things networks.

IV Kotenko, I Saenko… - J. Wirel. Mob. Networks …, 2017 - researchgate.net
Abstract Nowadays, the Internet of Things (IoT) networks are increasingly used in many
areas. At the same time, the approach connected with the implementation of the network …

Organizational information security as a complex adaptive system: insights from three agent-based models

AJ Burns, C Posey, JF Courtney, TL Roberts… - Information Systems …, 2017 - Springer
The management of information security can be conceptualized as a complex adaptive
system because the actions of both insiders and outsiders co-evolve with the organizational …

A practical framework for cyber defense generation, enforcement and evaluation

SY Enoch, CY Moon, D Lee, MK Ahn, DS Kim - Computer Networks, 2022 - Elsevier
It is challenging to enforce and evaluate cyber-defenses for large networks. The current state-
of-the-art approaches on defense enforcement and evaluations are manually performed by …

Multi-agent modelling and simulation of cyber-attacks and cyber-defense for homeland security

I Kotenko - 2007 4th IEEE Workshop on Intelligent Data …, 2007 - ieeexplore.ieee.org
The paper considers the approach to investigation of distributed cooperative cyber-defense
mechanisms against network attacks. The approach is based on the agent-based simulation …

[图书][B] An introduction to cyber modeling and simulation

JM Couretas - 2018 - books.google.com
Introduces readers to the field of cyber modeling and simulation and examines current
developments in the US and internationally This book provides an overview of cyber …