PE Kaloroumakis, MJ Smith - The MITRE Corporation, 2021 - next.d3fend.mitre.org
This paper describes our research and development toward a precise, unambiguous, and information-dense knowledge graph of cybersecurity countermeasures. In project work for …
Privacy has been frequently identified as a main concern for systems that deal with personal information. However, much of existing work on privacy requirements deals with them as a …
S Khan, S Parkinson - Guide to Vulnerability Analysis for Computer …, 2018 - Springer
Vulnerability assessment is the essential and well-established process of probing security flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …
Many public sources of cyber threat and vulnerability information exist to help defend cyber systems. This paper links MITRE's ATT&CK MATRIX of Tactics and Techniques, NIST's …
K Kandasamy, S Srinivas, K Achuthan… - IEEE Access, 2022 - ieeexplore.ieee.org
Cyberattacks on healthcare institutions are on an upsurge all over the world. Recently, Asian hospitals have become targets of numerous cyberattacks. While Western countries like the …
T Takahashi, Y Kadobayashi, H Fujiwara - Proceedings of the 3rd …, 2010 - dl.acm.org
Widespread deployment of the Internet enabled building of an emerging IT delivery model, ie, cloud computing. Albeit cloud computing-based services have rapidly developed, their …
BF Martins, LJ Serrano Gil, JF Reyes Román… - Software and Systems …, 2022 - Springer
Organizations are actively seeking efficient solutions for the management and protection of their assets. However, Cybersecurity is a vast and complex domain, especially for large …
V Mavroeidis, A Jøsang - … of the 2nd international conference on …, 2018 - dl.acm.org
Threat actors can be persistent, motivated and agile, and they leverage a diversified and extensive set of tactics, techniques, and procedures to attain their goals. In response to that …