[HTML][HTML] Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic mapping review

ID Sánchez-García, TSF Gilabert… - Computers & Security, 2023 - Elsevier
Cybersecurity continues to be one of the principal issues in the computing environment.
Organizations and researchers have made various efforts to mitigate the risks of cyberspace …

Towards a machine learning based situational awareness framework for cybersecurity: an SDN implementation

Y Nikoloudakis, I Kefaloukos, S Klados, S Panagiotakis… - Sensors, 2021 - mdpi.com
The ever-increasing number of internet-connected devices, along with the continuous
evolution of cyber-attacks, in terms of volume and ingenuity, has led to a widened cyber …

Ontology of metrics for cyber security assessment

E Doynikova, A Fedorchenko, I Kotenko - Proceedings of the 14th …, 2019 - dl.acm.org
Development of metrics that are valuable for assessing security and decision making is an
important element of efficient counteraction to cyber threats. The paper proposes an …

Assessment of the cybersecurity vulnerability of construction networks

BRK Mantha, B García de Soto - Engineering, Construction and …, 2021 - emerald.com
Purpose The aim of this study is o examine the advantages and disadvantages of different
existing scoring systems in the cybersecurity domain and their applicability to the AEC …

Measuring the accuracy of software vulnerability assessments: experiments with students and professionals

L Allodi, M Cremonini, F Massacci, W Shim - Empirical Software …, 2020 - Springer
Assessing the risks of software vulnerabilities is a key process of software development and
security management. This assessment requires to consider multiple factors (technical …

[PDF][PDF] Network Security Situation Assessment Based on Text SimHash in Big Data Environment.

P Lin, Y Chen - Int. J. Netw. Secur., 2019 - ijns.jalaxy.com.tw
The existing methods of network security situation assessment have high complexity and not
effectively in the big data environment. This paper proposes an assessment model based on …

Automatic security management of smart infrastructures using attack graph and risk analysis

D Ivanov, M Kalinin, V Krundyshev… - 2020 Fourth World …, 2020 - ieeexplore.ieee.org
Smart infrastructure integrates cyberphysical systems, self-organizing networks of devices,
fog computing to enhance the quality and convenience of manufacturing and social life …

A semantic model for security evaluation of information systems

E Doynikova, A Fedorchenko… - Journal of Cyber …, 2020 - journals.riverpublishers.com
Modern information systems are characterized by huge security related data streams. For
cyber security management in such systems, novel models and techniques for efficient …

Framework for risk assessment in cyber situational awareness

X Rongrong, Y Xiaochun, H Zhiyu - IET Information Security, 2019 - Wiley Online Library
A large number of data is generated to help network analysts to evaluate the network
security situation in traditional detection and prevention measures, but it is not used fully and …

Vulnerability modelling for hybrid IT systems

A Ur-Rehman, I Gondal… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Common vulnerability scoring system (CVSS) is an industry standard that can assess the
vulnerability of nodes in traditional computer systems. The metrics computed by CVSS …