A systematic literature review of how cybersecurity-related behavior has been assessed

K Kannelønning, SK Katsikas - Information & Computer Security, 2023 - emerald.com
Purpose Cybersecurity attacks on critical infrastructures, businesses and nations are rising
and have reached the interest of mainstream media and the public's consciousness. Despite …

Security operations center: A systematic study and open challenges

M Vielberth, F Böhm, I Fichtinger, G Pernul - Ieee Access, 2020 - ieeexplore.ieee.org
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …

[BOOK][B] Building a cybersecurity culture in organizations

I Corradini - 2020 - Springer
Over the last few years, cybersecurity has become one of the most important issues for
organizations across all sectors, industries and countries. In fact, an effective management …

[HTML][HTML] A cybersecurity model in cloud computing environments

LBA Rabai, M Jouini, AB Aissa, A Mili - Journal of King Saud University …, 2013 - Elsevier
Cloud computing is an emerging paradigm of computing that replaces computing as a
personal commodity by computing as a public utility. As such, it offers all the advantages of a …

Cybersecurity resilience demonstration for wind energy sites in co-simulation environment

M Mccarty, J Johnson, B Richardson, C Rieger… - IEEE …, 2023 - ieeexplore.ieee.org
Sandia National Laboratories and Idaho National Laboratory deployed state-of-the-art
cybersecurity technologies within a virtualized, cyber-physical wind energy site to …

Capability maturity model and metrics framework for cyber cloud security

NT Le, DB Hoang - Scalable Computing, 2017 - opus.lib.uts.edu.au
© 2017 SCPE. Cyber space is affecting all areas of our life. Cloud computing is the cutting-
edge technology of this cyber space and has established itself as one of the most important …

Seeking the relation between performance and security in modern systems: metrics and measures

R Fujdiak, P Mlynek, P Blazek… - 2018 41st …, 2018 - ieeexplore.ieee.org
Nowadays, the security, safety and performance became a crucial part of the product life
cycle (PLC) in which the requirements for these parameters are continuously growing …

Evaluation measures for relevance and credibility in ranked lists

C Lioma, JG Simonsen, B Larsen - Proceedings of the ACM SIGIR …, 2017 - dl.acm.org
Recent discussions on alternative facts, fake news, and post truth politics have motivated
research on creating technologies that allow people not only to access information, but also …

SoK: linking information security metrics to management success factors

R Diesch, H Krcmar - Proceedings of the 15th International Conference …, 2020 - dl.acm.org
Information security metrics are used to measure the effectiveness of information security
countermeasures. A large number of metrics and their technical nature creates difficulties …

Security metrics in industrial control systems

ZA Collier, M Panwar, AA Ganin, A Kott… - Cyber-security of SCADA …, 2016 - Springer
Risk—the topic of the previous chapter—is the best known and perhaps the best studied
approach within a much broader class of cyber security assessments. However, risk …