A comprehensive study of the IoT cybersecurity in smart cities
Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT),
Cloud Computing, and Artificial Intelligence (AI) to enhance public services management …
Cloud Computing, and Artificial Intelligence (AI) to enhance public services management …
Artificial intelligence techniques for cognitive sensing in future IoT: State-of-the-Art, potentials, and challenges
Smart, secure and energy-efficient data collection (DC) processes are key to the realization
of the full potentials of future Internet of Things (FIoT)-based systems. Currently, challenges …
of the full potentials of future Internet of Things (FIoT)-based systems. Currently, challenges …
Threat actors' tenacity to disrupt: Examination of major cybersecurity incidents
The exponential growth in the interconnectedness of people and devices, as well as the
upward trend in cyberspace usage will continue to lead to a greater reliance on the internet …
upward trend in cyberspace usage will continue to lead to a greater reliance on the internet …
SOC critical path: A defensive kill chain model
A Villalón-Huerta, HM Gisbert, I Ripoll-Ripoll - Ieee Access, 2022 - ieeexplore.ieee.org
Different kill chain models have been defined and analyzed to provide a common sequence
of actions followed in offensive cyber operations. These models allow analysts to identify …
of actions followed in offensive cyber operations. These models allow analysts to identify …
On Collaboration and Automation in the Context of Threat Detection and Response with Privacy-Preserving Features
Organizations and their security operation centers often struggle to detect and respond
effectively to an extensive quantity of ever-evolving cyberattacks. While collaboration, such …
effectively to an extensive quantity of ever-evolving cyberattacks. While collaboration, such …
SAIBERSOC: A Methodology and Tool for Experimenting with Security Operation Centers
M Rosso, M Campobasso, G Gankhuyag… - Digital Threats: Research …, 2022 - dl.acm.org
In this article, we introduce SAIBERSOC (Synthetic Attack Injection to Benchmark and
Evaluate the Performance of Security Operation Centers), a tool and methodology enabling …
Evaluate the Performance of Security Operation Centers), a tool and methodology enabling …
An Introduction of System-Scientific Approaches to Cognitive Security
Human cognitive capacities and the needs of human-centric solutions for" Industry 5.0"
make humans an indispensable component in Cyber-Physical Systems (CPSs), referred to …
make humans an indispensable component in Cyber-Physical Systems (CPSs), referred to …
Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation
Cybersecurity playbooks assume an increasingly important role as threat-specific
documents for guiding operators in the context of cyber incident response. However, these …
documents for guiding operators in the context of cyber incident response. However, these …
[PDF][PDF] Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation
The large-scale transition from physical systems and services to interconnected digital ones
benefits both organisations and users by making respective functionalities more easily …
benefits both organisations and users by making respective functionalities more easily …
An Assessment of Capabilities Required for Effective Cybersecurity Incident Management-A Systematic Literature Review
Reports from multiple independent sources reveal that a lack of preparation/readiness for
cybersecurity incidents detrimentally affects business continuity and delays the recovery of …
cybersecurity incidents detrimentally affects business continuity and delays the recovery of …