A systematic review of cyber-resilience assessment frameworks

DAS Estay, R Sahay, MB Barfod, CD Jensen - Computers & security, 2020 - Elsevier
Cyber-attacks are regarded as one of the most serious threats to businesses worldwide.
Organizations dependent on Information Technology (IT) derive value not only from …

Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework

T Jabar, M Mahinderjit Singh - Sensors, 2022 - mdpi.com
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …

MITRE ATT&CK-driven cyber risk assessment

M Ahmed, S Panda, C Xenakis… - Proceedings of the 17th …, 2022 - dl.acm.org
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …

Offensive security: Towards proactive threat hunting via adversary emulation

AB Ajmal, MA Shah, C Maple, MN Asghar… - IEEE Access, 2021 - ieeexplore.ieee.org
Attackers increasingly seek to compromise organizations and their critical data with
advanced stealthy methods, often utilising legitimate tools. In the main, organisations …

Digital healthcare-cyberattacks in asian organizations: an analysis of vulnerabilities, risks, nist perspectives, and recommendations

K Kandasamy, S Srinivas, K Achuthan… - IEEE Access, 2022 - ieeexplore.ieee.org
Cyberattacks on healthcare institutions are on an upsurge all over the world. Recently, Asian
hospitals have become targets of numerous cyberattacks. While Western countries like the …

[图书][B] Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures

BB Gupta, A Dahiya - 2021 - taylorfrancis.com
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are
increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource …

Cybersecurity risk assessment: a systematic mapping review, proposal, and validation

ID Sánchez-García, J Mejía, T San Feliu Gilabert - Applied Sciences, 2022 - mdpi.com
Incorporating technologies across all sectors has meant that cybersecurity risk assessment
is now a critical step in cybersecurity risk management. However, risk assessment can be a …

Documentation and Virtualisation of Vernacular Cultural Heritage: The Case of Underground Wine Cellars in Atauta (Soria)

TR Herrero-Tejedor, MÁ Maté-González… - Heritage, 2023 - mdpi.com
The cultural heritage associated with rural systems is extremely valuable and is a sign of
identity for cultures that are disappearing or undergoing transformation. This paper explains …

A threat‐intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision‐making

M Dekker, L Alevizos - Security and Privacy, 2024 - Wiley Online Library
The challenge of decision‐making under uncertainty in information security has become
increasingly important, given the unpredictable probabilities and effects of events in the ever …

Educational model for evaluation of airport NIS security for safe and sustainable air transport

M Kelemen, V Polishchuk, B Gavurová, R Andoga… - Sustainability, 2020 - mdpi.com
One of the praxeological problems of safe and sustainable air transport (airfreight
transport/air cargo, and air passenger transport) is the prevention and management of risks …