The ever-increasing number of internet-connected devices, along with the continuous evolution of cyber-attacks, in terms of volume and ingenuity, has led to a widened cyber …
Development of metrics that are valuable for assessing security and decision making is an important element of efficient counteraction to cyber threats. The paper proposes an …
Purpose The aim of this study is o examine the advantages and disadvantages of different existing scoring systems in the cybersecurity domain and their applicability to the AEC …
Assessing the risks of software vulnerabilities is a key process of software development and security management. This assessment requires to consider multiple factors (technical …
P Lin, Y Chen - Int. J. Netw. Secur., 2019 - ijns.jalaxy.com.tw
The existing methods of network security situation assessment have high complexity and not effectively in the big data environment. This paper proposes an assessment model based on …
D Ivanov, M Kalinin, V Krundyshev… - 2020 Fourth World …, 2020 - ieeexplore.ieee.org
Smart infrastructure integrates cyberphysical systems, self-organizing networks of devices, fog computing to enhance the quality and convenience of manufacturing and social life …
Modern information systems are characterized by huge security related data streams. For cyber security management in such systems, novel models and techniques for efficient …
X Rongrong, Y Xiaochun, H Zhiyu - IET Information Security, 2019 - Wiley Online Library
A large number of data is generated to help network analysts to evaluate the network security situation in traditional detection and prevention measures, but it is not used fully and …
A Ur-Rehman, I Gondal… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Common vulnerability scoring system (CVSS) is an industry standard that can assess the vulnerability of nodes in traditional computer systems. The metrics computed by CVSS …