Review of cybersecurity assessment methods: Applicability perspective

R Leszczyna - Computers & Security, 2021 - Elsevier
Cybersecurity assessments are crucial in building the assurance that vital cyberassets are
effectively protected from threats. Multiple assessment methods have been proposed during …

Vulnerability Identification and Assessment for Critical Infrastructures in the Energy Sector

N Nikolaou, A Papadakis, K Psychogyios, T Zahariadis - Electronics, 2023 - mdpi.com
Vulnerability identification and assessment is a key process in risk management. While
enumerations of vulnerabilities are available, it is challenging to identify vulnerability sets …

[PDF][PDF] Next-generation protection protocols and procedures for securing critical infrastructure

CC Nwoye - International Journal of Research Publication and …, 2024 - researchgate.net
Critical infrastructure systems, including energy grids, water supply networks, and
transportation frameworks, form the backbone of modern societies. These systems are …

The Notion of Relevance in Cybersecurity: A Categorization of Security Tools and Deduction of Relevance Notions

P Kuehn, J Bäumler, MA Kaufhold, M Wendelborn… - 2022 - dl.gi.de
Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic
field like cybersecurity, gathering up-to-date information is usually a manual, time …

Choosing the right cybersecurity solution: A review of selection and evaluation criteria

R Leszczyna - 2022 - mostwiedzy.pl
Information technologies evolve continuously reaching pioneering areas that bring in new
cybersecurity challenges. Security engineering needs to keep pace with the advancing …

Cybersecurity Awareness in Critical Sectors–a Systematic Literature Review

JL Leirmo - International Conference on Flexible Automation and …, 2024 - Springer
Cybersecurity has been a concern for years, and cybercriminals continue to develop more
sophisticated methods for cyber-attacks. Traditionally, cybersecurity has been viewed as …

A Cybersecurity Assessment of the Remote Working Environment During Covid-19. A Case Study of Financial Regulators in Kenya

DM Ngere - 2022 - erepository.uonbi.ac.ke
The Covid-19 pandemic abruptly transformed the way businesses and organizations
operate, with governments around the world implementing measures to protect people in …

Tendencias investigativas en el uso de tecnologías de Big Data en sistemas de ciberseguridad

LF Garcés-Giraldo, M Benjumea-Arias… - Revista Ibérica de …, 2022 - search.proquest.com
El incesante avance tecnológico producto del internet e Internet de las Cosas, ha traído
grandes avances informáticos, así como diferentes retos en términos de ciberseguridad …

Improving resilience in Critical Infrastructures through learning from past events

R Cantelmi - 2023 - iris.uniroma1.it
Modern societies are increasingly dependent on the proper functioning of Critical
Infrastructures (CIs). CIs produce and distribute essential goods or services, as for power …

[PDF][PDF] Conference On AI In Systems Engineering (IC-AISE'2024)

S SAFI, M FRIKEL - 2024 - ic-aise.sciencesconf.org
The main motivation of this conference consists in providing a comprehensive presentation
of the control system development from an engineering perspective. A particular emphasis is …