[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

Enterprise architecture modeling for cybersecurity analysis in critical infrastructures-A systematic literature review

Y Jiang, MA Jeusfeld, M Mosaad, N Oo - International Journal of Critical …, 2024 - Elsevier
As digital landscapes become increasingly complex, safeguarding sensitive information and
systems against cyber threats has become a paramount concern for organizations. This …

Humans and automation: Augmenting security operation centers

J Tilbury, S Flowerday - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
The continuous integration of automated tools into security operation centers (SOCs)
increases the volume of alerts for security analysts. This amplifies the risk of automation bias …

Managing the Inevitable–A Maturity Model to Establish Incident Response Management Capabilities

M Bitzer, B Häckel, D Leuthe, J Ott, B Stahl… - Computers & Security, 2023 - Elsevier
Although the ongoing digital transformation offers new opportunities for organizations, more
emphasis on information security is needed due to the evolving cyber-threat landscape …

[HTML][HTML] Understanding situation awareness in SOCs, a systematic literature review

HJ Ofte, S Katsikas - Computers & Security, 2023 - Elsevier
Situation awareness is shown through human factors research to be a valuable construct to
understand and improve how humans perform while operating complex systems in critical …

[HTML][HTML] Automation Bias and Complacency in Security Operation Centers

J Tilbury, S Flowerday - Computers, 2024 - mdpi.com
The volume and complexity of alerts that security operation center (SOC) analysts must
manage necessitate automation. Increased automation in SOCs amplifies the risk of …

SoK: applications and challenges of using recommender systems in cybersecurity incident handling and response

M Husák, M Čermák - Proceedings of the 17th International Conference …, 2022 - dl.acm.org
Incident handling, a fundamental activity of a cybersecurity incident response team, is a
complex discipline that consumes a significant amount of personnel's time and costs. There …

'We Do Not Have the Capacity to Monitor All Media': A Design Case Study on Cyber Situational Awareness in Computer Emergency Response Teams

MA Kaufhold, T Riebe, M Bayer, C Reuter - Proceedings of the CHI …, 2024 - dl.acm.org
Computer Emergency Response Teams (CERTs) provide advisory, preventive and reactive
cybersecurity services for authorities, citizens, and businesses. However, their responsibility …

[HTML][HTML] A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies

K Bennouk, N Ait Aali, Y El Bouzekri El Idrissi… - … of Cybersecurity and …, 2024 - mdpi.com
The number of new vulnerabilities continues to rise significantly each year. Simultaneously,
vulnerability databases have challenges in promptly sharing new security events with …

[HTML][HTML] Reducing the risk of social engineering attacks using SOAR measures in a real world environment: A case study

S Waelchli, Y Walter - Computers & Security, 2025 - Elsevier
The global cost of successful cyberattacks is increasing annually, with there being a shift
towards social engineering threats in recent years. Cybercriminals are increasingly targeting …