A selective ensemble model for cognitive cybersecurity analysis Y Jiang, Y Atif Journal of Network and Computer Applications 193, 103210, 2021 | 27 | 2021 |
Evaluating the data inconsistency of open-source vulnerability repositories Y Jiang, M Jeusfeld, J Ding Proceedings of the 16th International Conference on Availability …, 2021 | 22 | 2021 |
An approach to discover and assess vulnerability severity automatically in cyber-physical systems Y Jiang, Y Atif 13th international conference on security of information and networks, 1-8, 2020 | 19 | 2020 |
Model-based cybersecurity analysis: extending enterprise modeling to critical infrastructure cybersecurity Y Jiang, MA Jeusfeld, J Ding, E Sandahl Business & Information Systems Engineering 65 (6), 643-676, 2023 | 15 | 2023 |
Towards automatic discovery and assessment of vulnerability severity in cyber–physical systems Y Jiang, Y Atif Array 15, 100209, 2022 | 12 | 2022 |
A language and repository for cyber security of smart grids Y Jiang, M Jeusfeld, Y Atif, J Ding, C Brax, E Nero 2018 IEEE 22nd International Enterprise Distributed Object Computing …, 2018 | 12 | 2018 |
Cyber-physical systems security based on a cross-linked and correlated vulnerability database Y Jiang, Y Atif, J Ding International Conference on Critical Information Infrastructures Security, 71-82, 2019 | 10 | 2019 |
A semantic framework with humans in the loop for vulnerability-assessment in cyber-physical production systems Y Jiang, Y Atif, J Ding, W Wang International Conference on Risks and Security of Internet and Systems, 128-143, 2019 | 7 | 2019 |
Enterprise architecture modeling for cybersecurity analysis in critical infrastructures-A systematic literature review Y Jiang, MA Jeusfeld, M Mosaad, N Oo International Journal of Critical Infrastructure Protection, 100700, 2024 | 6 | 2024 |
Comparison between frequency splitting approach and fuzzy logic control as an energy control strategy in hybrid vehicles Z Xu, L Chen, Y Jiang 2015 International Conference on Control, Automation and Information …, 2015 | 5 | 2015 |
Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber–Physical Production Systems Y Jiang, W Wang, J Ding, X Lu, Y Jing Future Internet 16 (4), 134, 2024 | 4 | 2024 |
Vulnerability Analysis for Critical Infrastructures Y Jiang University of Skövde, 2022 | 4 | 2022 |
Cyber-threat analysis for Cyber-Physical Systems: Technical report for Package 4, Activity 3 of ELVIRA project Y Atif, Y Jiang, MA Jeusfeld, J Ding, B Lindström, SF Andler, C Brax, ... University of Skövde, 2018 | 4 | 2018 |
Cyber-threat intelligence architecture for smart-grid critical infrastructures protection Y Atif, J Ding, B Lindström, M Jeusfeld, SF Andler, J Yuning, C Brax, ... The International Conference on Critical Information Infrastructures …, 2017 | 3 | 2017 |
Complex Dependencies Analysis: Technical Description of Complex Dependencies in Critical Infrastructures, ie Smart Grids. Work Package 2.1 of the ELVIRA Project Y Jiang, J Ding, Y Atif, M Jeusfeld, S Andler, B Lindström, C Brax, ... University of Skövde, 2018 | 2 | 2018 |
A Survey on Vulnerability Prioritization: Taxonomy, Metrics, and Research Challenges Y Jiang, N Oo, Q Meng, HW Lim, B Sikdar arXiv preprint arXiv:2502.11070, 2025 | | 2025 |
VulRG: Multi-Level Explainable Vulnerability Patch Ranking for Complex Systems Using Graphs Y Jiang, N Oo, Q Meng, HW Lim, B Sikdar arXiv preprint arXiv:2502.11143, 2025 | | 2025 |
MITRE ATT&CK Applications in Cybersecurity and The Way Forward Y Jiang, Q Meng, F Shang, N Oo, LTH Minh, HW Lim, B Sikdar arXiv preprint arXiv:2502.10825, 2025 | | 2025 |
Poster: M2ASK: A Correlation-Based Multi-Step Attack Scenario Detection Framework Using MITRE ATT&CK Mapping Q Meng, N Oo, Y Jiang, HW Lim, B Sikdar Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | | 2024 |
Knowledge graph construction method, electronic equipment and storage medium (知识图谱的构建方法、电子设备及存储介质) 蒋雨宁, 赵学亮, 李日标, 邢振昌, 申志奇 CN Patent CN117,252,261 A, 2023 | | 2023 |