Data breach management: An integrated risk model

F Khan, JH Kim, L Mathiassen, R Moore - Information & Management, 2021 - Elsevier
In response to organizations' increasing vulnerability to data breaches, we present an
integrated risk model for data breach management based on a systematic review of the …

A systematic review of radio frequency threats in IOMT

IA Jayaraj, B Shanmugam, S Azam… - Journal of Sensor and …, 2022 - mdpi.com
In evolving technology, attacks on medical devices are optimized due to the driving force of
AI, computer vision, mixed reality, and the internet of things (IoT). Optimizing cybersecurity …

A shared cyber threat intelligence solution for smes

M Van Haastrecht, G Golpur, G Tzismadia, R Kab… - Electronics, 2021 - mdpi.com
Small-and medium-sized enterprises (SMEs) frequently experience cyberattacks, but often
do not have the means to counter these attacks. Therefore, cybersecurity researchers and …

Resolving the cybersecurity data sharing paradox to scale up cybersecurity via a co-production approach towards data sharing

A Atapour-Abarghouei, AS McGough… - … Conference on Big …, 2020 - ieeexplore.ieee.org
As cybercriminals scale up their operations to increase their profits or inflict greater harm, we
argue that there is an equal need to respond to their threats by scaling up cyber-security. To …

: A Systematic Approach to Build and Evolve a Temporal OWL 2 Ontology Based on Temporal JSON Big Data

Z Brahmia, F Grandi, R Bouaziz - Big Data Mining and Analytics, 2022 - ieeexplore.ieee.org
Nowadays, ontologies, which are defined under the OWL 2 Web Ontology Language (OWL
2), are being used in several fields like artificial intelligence, knowledge engineering, and …

An Exploratory Study of Risk Quantification Loss Event Frequency (LEF) Approaches Using the Factor Analysis of Information Risk (FAIR) Model in Non-Financial Risk …

JL Gowen Jr - 2023 - search.proquest.com
This study explored the limited use of non-financial banking quantitative risk assessment
methodologies. Quantitative assessments have been avoided due to a lack of historical data …

[图书][B] APT verstehen und abwehren: Strategien und Konzepte für die Implementierung einer hochsicheren Administrationsumgebung zur Absicherung von …

H Winzer - 2021 - books.google.com
Für eine Klasse von Bedrohungen, die als Advanced Persistent Threats (APTs) bekannt ist,
beschreibt diese Arbeit neben der Darstellung des Angriffsablaufs auch Strategien und …