[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

Cybersecurity in logistics and supply chain management: An overview and future research directions

KF Cheung, MGH Bell, J Bhattacharjya - Transportation Research Part E …, 2021 - Elsevier
Technological applications have increasingly improved the quality of services in the logistics
industry. However, the adoption of internet-based technologies has increased the attack …

Survey of attack projection, prediction, and forecasting in cyber security

M Husák, J Komárková, E Bou-Harb… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …

[HTML][HTML] Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis

V Bolbot, K Kulkarni, P Brunou, OV Banda… - International Journal of …, 2022 - Elsevier
Ships and maritime infrastructure are becoming increasingly interconnected as the maritime
industry is undergoing the industry 4.0 revolution. This development is associated with novel …

A review of threat modelling approaches for APT-style attacks

M Tatam, B Shanmugam, S Azam, K Kannoorpatti - Heliyon, 2021 - cell.com
Threats are potential events, intentional or not, that compromise the confidentiality, integrity,
and/or availability of information systems. Defending against threats and attacks requires …

[HTML][HTML] Information sharing in supply chains–Interoperability in an era of circular economy

AA Khan, J Abonyi - Cleaner Logistics and Supply Chain, 2022 - Elsevier
In order to realize the goals of Industry 5.0 (I5. 0), which has data interoperability as one of
its core principles, the future research in the Supply Chain (SC) visibility has to be aligned …

The importance of conceptualising the human-centric approach in maintaining and promoting cybersecurity-hygiene in healthcare 4.0

K Kioskli, T Fotis, S Nifakos, H Mouratidis - Applied Sciences, 2023 - mdpi.com
The cyberspace depicts an increasing number of difficulties related to security, especially in
healthcare. This is evident from how vulnerable critical infrastructures are to cyberattacks …

FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm

Y Fang, Y Liu, C Huang, L Liu - Plos one, 2020 - journals.plos.org
In recent years, the number of vulnerabilities discovered and publicly disclosed has shown a
sharp upward trend. However, the value of exploitation of vulnerabilities varies for attackers …

Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks

T Chadza, KG Kyriakopoulos, S Lambotharan - Future generation …, 2020 - Elsevier
Abstract Hidden Markov Models have been extensively used for determining computer
systems under a Multi-Stage Network Attack (MSA), however, acquisition of optimal model …

A systematic review of recommender systems and their applications in cybersecurity

A Pawlicka, M Pawlicki, R Kozik, RS Choraś - Sensors, 2021 - mdpi.com
This paper discusses the valuable role recommender systems may play in cybersecurity.
First, a comprehensive presentation of recommender system types is presented, as well as …