Metrics and Red Teaming in Cyber Resilience and Effectiveness: A Systematic Literature Review

S Yulianto, B Soewito, FL Gaol… - 2023 29th International …, 2023 - ieeexplore.ieee.org
Rising cyber risks have compelled organizations to adopt better cyber-protection measures.
This study focused on discovering crucial security metrics and assessing the function of red …

Optimal Cyber Attack Strategy Using Reinforcement Learning Based on Common Vulnerability Scoring System.

BS Kim, HW Suk, YH Choi… - … in Engineering & …, 2024 - search.ebscohost.com
Currently, cybersecurity threats such as data breaches and phishing have been on the rise
due to the many different attack strategies of cyber attackers, significantly increasing risks to …

Security Implications of User Non-compliance Behavior to Software Updates: A Risk Assessment Study

M Tamanna, JD Stephens, M Anwar - arXiv preprint arXiv:2411.06262, 2024 - arxiv.org
Software updates are essential to enhance security, fix bugs, and add better features to
existing software. However, while some users comply and update their systems upon …

Software vulnerability detection method based on code attribute graph presentation and Bi-LSTM neural network extraction

H Jiang, S Ji, C Zha, Y Liu - International Conference on …, 2024 - spiedigitallibrary.org
Nowadays, the scale of software is getting larger and more complex. The forms of
vulnerability also tend to be more diversified. Traditional vulnerability detection methods …