L Gamisch, D Pöhn - Proceedings of the 18th International Conference …, 2023 - dl.acm.org
Phishing is a major cyber threat to organizations that can cause financial and reputational damage, threatening their existence. The technical measures against phishing should be …
Security teams process a vast number of security events. Their security analysts spend considerable time triaging cybersecurity alerts. Many alerts reveal incidents that must be …
Lateral movement, in which a cyber attacker progresses through an enterprise network in order to compromise its most valuable assets, is a key stage of any intrusion nowadays …
Diverse, accurate, and up-to-date training environments are essential for training cybersecurity experts and autonomous systems. However, preparation of their content is …
Cyber threat modeling is a proactive method for identifying possible cyber attacks on network infrastructure that has a wide range of applications in security assessment, risk …
Formal Ontology is a discipline whose business is to develop formal theories about general aspects of reality such as identity, dependence, parthood, truthmaking, causality, etc. A …
C Liu, B Wang, F Li, J Tian, Y Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the development of the Air Traffic Management System (ATM), the ATM network has transitioned from a closed physical isolation network to an open Cyber-Physical System …
Integration of the Internet of Things (IoT) in industrial settings necessitates robust cybersecurity measures to mitigate risks such as data leakage, vulnerability exploitation, and …