A systematic literature review of how cybersecurity-related behavior has been assessed
Purpose Cybersecurity attacks on critical infrastructures, businesses and nations are rising
and have reached the interest of mainstream media and the public's consciousness. Despite …
and have reached the interest of mainstream media and the public's consciousness. Despite …
Security operations center: A systematic study and open challenges
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …
importance has grown significantly, especially over the last five years. This is mainly due to …
[BOOK][B] Building a cybersecurity culture in organizations
I Corradini - 2020 - Springer
Over the last few years, cybersecurity has become one of the most important issues for
organizations across all sectors, industries and countries. In fact, an effective management …
organizations across all sectors, industries and countries. In fact, an effective management …
[HTML][HTML] A cybersecurity model in cloud computing environments
Cloud computing is an emerging paradigm of computing that replaces computing as a
personal commodity by computing as a public utility. As such, it offers all the advantages of a …
personal commodity by computing as a public utility. As such, it offers all the advantages of a …
Cybersecurity resilience demonstration for wind energy sites in co-simulation environment
Sandia National Laboratories and Idaho National Laboratory deployed state-of-the-art
cybersecurity technologies within a virtualized, cyber-physical wind energy site to …
cybersecurity technologies within a virtualized, cyber-physical wind energy site to …
Capability maturity model and metrics framework for cyber cloud security
© 2017 SCPE. Cyber space is affecting all areas of our life. Cloud computing is the cutting-
edge technology of this cyber space and has established itself as one of the most important …
edge technology of this cyber space and has established itself as one of the most important …
Seeking the relation between performance and security in modern systems: metrics and measures
R Fujdiak, P Mlynek, P Blazek… - 2018 41st …, 2018 - ieeexplore.ieee.org
Nowadays, the security, safety and performance became a crucial part of the product life
cycle (PLC) in which the requirements for these parameters are continuously growing …
cycle (PLC) in which the requirements for these parameters are continuously growing …
Evaluation measures for relevance and credibility in ranked lists
Recent discussions on alternative facts, fake news, and post truth politics have motivated
research on creating technologies that allow people not only to access information, but also …
research on creating technologies that allow people not only to access information, but also …
SoK: linking information security metrics to management success factors
Information security metrics are used to measure the effectiveness of information security
countermeasures. A large number of metrics and their technical nature creates difficulties …
countermeasures. A large number of metrics and their technical nature creates difficulties …
Security metrics in industrial control systems
Risk—the topic of the previous chapter—is the best known and perhaps the best studied
approach within a much broader class of cyber security assessments. However, risk …
approach within a much broader class of cyber security assessments. However, risk …