Counterattacking cyber threats: A framework for the future of cybersecurity

MF Safitra, M Lubis, H Fakhrurroja - Sustainability, 2023 - mdpi.com
Amidst the rapid advancements in the digital landscape, the convergence of digitization and
cyber threats presents new challenges for organizational security. This article presents a …

Building knowledge graphs from unstructured texts: Applications and impact analyses in cybersecurity education

G Agrawal, Y Deng, J Park, H Liu, YC Chen - Information, 2022 - mdpi.com
Knowledge graphs gained popularity in recent years and have been useful for concept
visualization and contextual information retrieval in various applications. However …

SoK: linking information security metrics to management success factors

R Diesch, H Krcmar - Proceedings of the 15th International Conference …, 2020 - dl.acm.org
Information security metrics are used to measure the effectiveness of information security
countermeasures. A large number of metrics and their technical nature creates difficulties …

A semantic model for security evaluation of information systems

E Doynikova, A Fedorchenko… - Journal of Cyber …, 2020 - journals.riverpublishers.com
Modern information systems are characterized by huge security related data streams. For
cyber security management in such systems, novel models and techniques for efficient …

DEFIA: Evaluate defense effectiveness by fusing behavior information of cyberattacks

Z Liu, C Hu, C Shan, Z Peng - Information Sciences, 2023 - Elsevier
The existing researches point to a lack of studies addressing the quantitative evaluation of
the effectiveness of cyber defense. This difficult matter has been plaguing cyber security …

Aiseckg: Knowledge graph dataset for cybersecurity education

G Agrawal - AAAI-MAKE 2023: Challenges Requiring the …, 2023 - par.nsf.gov
Cybersecurity education is exceptionally challenging as it involves learning the complex
attacks; tools and developing critical problem-solving skills to defend the systems. For a …

Can I Sleep Safely in My Smarthome? A Novel Framework on Automating Dynamic Risk Assessment in IoT Environments

A Collen, NA Nijdam - Electronics, 2022 - mdpi.com
Fully automated homes, equipped with the latest Internet of Things (IoT) devices, aiming to
drastically improve the quality of lives of those inhabiting such homes, is it not a perfect …

Cyberattack ontology: A knowledge representation for cyber supply chain security

A Yeboah-Ofori, UM Ismail, T Swidurski… - 2021 International …, 2021 - ieeexplore.ieee.org
Cyberattacks on cyber supply chain (CSC) systems and the cascading impacts have brought
many challenges and different threat levels with unpredictable consequences. The …

An ontology for security patterns

AP Vale, EB Fernandez - 2019 38th International Conference …, 2019 - ieeexplore.ieee.org
Security is a fundamental requirement that we must keep in mind when developing a
system. We approach the secure construction of software through the use of security …

An ontology to promote interoperability between cyber-physical security systems in critical infrastructures

A Canito, K Aleid, I Praça, J Corchado… - 2020 IEEE 6th …, 2020 - ieeexplore.ieee.org
Critical infrastructures, like airports and hospitals, provide essential services and are
considered huge investments in any country. Ensuring the security of these critical …