Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system

R Syed - Information & Management, 2020 - Elsevier
Effective vulnerability management requires the integration of vulnerability information
available on multiple sources, including social media. The information could be used to …

The influence of artificial intelligence on e-Governance and cybersecurity in smart cities: A stakeholder's perspective

SAA Bokhari, S Myeong - IEEE Access, 2023 - ieeexplore.ieee.org
Artificial intelligence (AI) has been identified as a critical technology of Fourth Industrial
Revolution (Industry 4.0) for protecting computer network systems against cyber-attacks …

User, usage and usability: Redefining human centric cyber security

M Grobler, R Gaire, S Nepal - Frontiers in big Data, 2021 - frontiersin.org
The effectiveness of cyber security measures are often questioned in the wake of hard hitting
security events. Despite much work being done in the field of cyber security, most of the …

Governance of cybersecurity-the case of South Africa

E Sutherland - The African Journal of Information and Communication, 2017 - scielo.org.za
Cybersecurity is a growing concern for governments, with the push for universal access to
the Internet, the increasing ubiquity of social networks and the growing reliance on digital …

Towards an ontology of security assessment: a core model proposal

F de Franco Rosa, M Jino, R Bonacin - Information Technology-New …, 2018 - Springer
Abstract SecAOnto (Security Assessment Ontology) aims at formalizing the knowledge on
“Security Assessment”. A conceptual formalization of this area is needed, given that there is …

Cyber4Dev‐Q: Calibrating cyber awareness in the developing country context

A Da Veiga, M Loock, K Renaud - The Electronic Journal of …, 2022 - Wiley Online Library
Citizens of the hyper‐connected world face tremendous challenges in managing their
personal online risks; that is to preserve their cyber safety, cyber security and cyber privacy …

[图书][B] Routledge companion to global cyber-security strategy

SN Romaniuk, M Manjikian - 2021 - books.google.com
This companion provides the most comprehensive and up-to-date comparative overview of
the cyber-security strategies and doctrines of the major states and actors in Europe, North …

Cybersecurity in South Africa: Towards Best Practices

S Mabunda - CyberBRICS: Cybersecurity Regulations in the BRICS …, 2021 - Springer
Cybersecurity has been on the South African agenda for a number of years now. Great
concern has been expressed over the proliferation of cybercrime, the lack of protection of …

A survey of security assessment ontologies

F de Franco Rosa, M Jino - Recent Advances in Information Systems and …, 2017 - Springer
A literature survey on ontologies concerning the Security Assessment domain has been
carried out to uncover initiatives that aim at formalizing concepts from the “Security …

Using an ontology as a model for the implementation of the national cybersecurity policy framework for South Africa

JJ van Vuuren, L Leenen… - Proceedings of the …, 2014 - books.google.com
Many developing countries are particularly vulnerable to cybersecurity threats due to an
enormous growth in Internet connectivity rates over the past decade. The South African …