A systematic review of recommender systems and their applications in cybersecurity

A Pawlicka, M Pawlicki, R Kozik, RS Choraś - Sensors, 2021 - mdpi.com
This paper discusses the valuable role recommender systems may play in cybersecurity.
First, a comprehensive presentation of recommender system types is presented, as well as …

SoK: applications and challenges of using recommender systems in cybersecurity incident handling and response

M Husák, M Čermák - Proceedings of the 17th International Conference …, 2022 - dl.acm.org
Incident handling, a fundamental activity of a cybersecurity incident response team, is a
complex discipline that consumes a significant amount of personnel's time and costs. There …

CyberTEA: a technical and economic approach for cybersecurity planning and investment

MF Franco, LZ Granville, B Stiller - NOMS 2023-2023 IEEE/IFIP …, 2023 - ieeexplore.ieee.org
It is essential to look at cybersecurity not only as a technical problem but also from
economic, societal, and legal perspectives. Companies need to pay more attention to …

Blockchain signaling system (BloSS): cooperative signaling of distributed denial-of-service attacks

B Rodrigues, E Scheid, C Killer, M Franco… - Journal of Network and …, 2020 - Springer
Abstract Distributed Denial-of-Service (DDoS) attacks are one of the major causes of
concerns for communication service providers. When an attack is highly sophisticated and …

Recommender systems in cybersecurity

L Ferreira, DC Silva, MU Itzazelaia - Knowledge and Information Systems, 2023 - Springer
With the growth of CyberTerrorism, enterprises worldwide have been struggling to stop
intruders from obtaining private data. Despite the efforts made by Cybersecurity experts, the …

[HTML][HTML] RCVaR: An economic approach to estimate cyberattacks costs using data from industry reports

MF Franco, F Künzler, J von der Assen, C Feng… - Computers & …, 2024 - Elsevier
Digitization increases business opportunities and the risk of companies being victims of
devastating cyberattacks. Therefore, managing risk exposure and cybersecurity strategies is …

SecBot: a business-driven conversational agent for cybersecurity planning and management

MF Franco, B Rodrigues, EJ Scheid… - … on network and …, 2020 - ieeexplore.ieee.org
Businesses were moving during the past decades to-ward full digital models, which made
companies face new threats and cyberattacks affecting their services and, consequently …

A recommender system for tracking vulnerabilities

P Huff, K McClanahan, T Le, Q Li - Proceedings of the 16th International …, 2021 - dl.acm.org
Mitigating vulnerabilities in software requires first identifying the vulnerabilities with an
organization's software assets. This seemingly trivial task involves maintaining vendor …

SecGrid: a visual system for the analysis and ML-based classification of cyberattack traffic

M Franco, J Von der Assen, L Boillat… - 2021 IEEE 46th …, 2021 - ieeexplore.ieee.org
Due to the increasing number of cyberattacks and respective predictions for the upcoming
years with even larger numbers of occurrences, companies are becoming aware not only …

Dual analysis for helping developers to find collaborators based on co‐changed files: An empirical study

K Constantino, F Belém… - Software: Practice and …, 2023 - Wiley Online Library
Software developers must collaborate at all stages of the software life‐cycle to create
successful complex software systems. To enable this collaboration, social coding platforms …