An integrated conceptual model for information system security risk management supported by enterprise architecture management

N Mayer, J Aubert, E Grandry, C Feltus… - Software & Systems …, 2019 - Springer
Risk management is today a major steering tool for any organisation wanting to deal with
information system (IS) security. However, IS security risk management (ISSRM) remains a …

Learning algorithm recommendation framework for IS and CPS security: Analysis of the RNN, LSTM, and GRU contributions

C Feltus - International Journal of Systems and Software Security …, 2022 - igi-global.com
Artificial intelligence and machine learning have recently made outstanding contributions to
the performance of information system and cyber--physical system security. There has been …

Towards an integration of information security management, risk management and enterprise architecture management–a literature review

T Diefenbach, C Lucke… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Organizations are faced with an increased number of security-related challenges. Our
research interest is on information security matters with our proposition being that enterprise …

Evaluation of the risk and security overlay of archimate to model information system security risks

N Mayer, C Feltus - 2017 IEEE 21st International Enterprise …, 2017 - ieeexplore.ieee.org
We evaluated the support proposed by the RSO to represent graphically our EAM-ISSRM
(Enterprise Architecture Management-Information System Security Risk Management) …

Structuring economic security of the organization

K Pylypenko, I Babiy, N Volkov, L Feofanov… - 2019 - repo.btu.kharkov.ua
The key components in economic security system of the enterprise, which have the greatest
influence of factors in external and internal environment are defined. The structuring of …

Current and future RL's contribution to emerging network security

C Feltus - Procedia Computer Science, 2020 - Elsevier
Reinforcement learning is a machine-learning paradigm, which learns the best actions an
agent needs to perform to maximize its rewards in a particular environment. Research into …

An integrated conceptual model for information system security risk management and enterprise architecture management based on togaf

N Mayer, J Aubert, E Grandry, C Feltus - The Practice of Enterprise …, 2016 - Springer
Risk management is today a major steering tool for any organization wanting to deal with
Information System (IS) security. However, IS Security Risk Management (ISSRM) remains …

[PDF][PDF] AI'S Contribution to Ubiquitous Systems and Pervasive Networks Security-Reinforcement Learning vs Recurrent Networks.

C Feltus - J. Ubiquitous Syst. Pervasive Networks, 2021 - academia.edu
Reinforcement learning and recurrent networks are two emerging machine-learning
paradigms. The first learns the best actions an agent needs to perform to maximize its …

Towards a systemic approach for information security risk management

Y Naudet, N Mayer, C Feltus - 2016 11th International …, 2016 - ieeexplore.ieee.org
Risk management in the field of information security is most often handled individually by
enterprises, taking only a limited view on the influential factors coming from their providers …

[PDF][PDF] Instrumental and technological directions to ensure economic security of enterprise

VV Astakhov, KV Astakhova, SS Demin… - … of Management and …, 2016 - portfolio.vvsu.ru
The market relations demands from heads of the enterprises not only implementation of
process of production of goods (services), but also development of the program of …