Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)

A Yasin, L Liu, T Li, J Wang, D Zowghi - Information and Software …, 2018 - Elsevier
Context: Security, in digitally connected organizational environments of today, involves
many different perspectives, including social, physical, and technical factors. In order to …

Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system

R Syed - Information & Management, 2020 - Elsevier
Effective vulnerability management requires the integration of vulnerability information
available on multiple sources, including social media. The information could be used to …

[HTML][HTML] Building knowledge graphs from unstructured texts: Applications and impact analyses in cybersecurity education

G Agrawal, Y Deng, J Park, H Liu, YC Chen - Information, 2022 - mdpi.com
Knowledge graphs gained popularity in recent years and have been useful for concept
visualization and contextual information retrieval in various applications. However …

Advanced Persistent Threat intelligent profiling technique: A survey

BH Tang, JF Wang, Z Yu, B Chen, W Ge, J Yu… - Computers and Electrical …, 2022 - Elsevier
With the boom in Internet and information technology, cyber-attacks are becoming more
frequent and sophisticated, especially Advanced Persistent Threat (APT) attacks. Unlike …

Improving software security awareness using a serious game

A Yasin, L Liu, T Li, R Fatima, W Jianmin - IET Software, 2019 - Wiley Online Library
Protecting people from cyber threats imposes great challenges, not only technically, but also
socially. To achieve the intended level of awareness, software security principles need to be …

An ontology-based security risk management model for information systems

OT Arogundade, A Abayomi-Alli, S Misra - Arabian Journal for Science and …, 2020 - Springer
Security risk management is a knowledge-intensive procedure that requires monitoring and
capturing relevant information that can assist in making the right decision by managers. In …

Reusable knowledge in security requirements engineering: a systematic map** study

A Souag, R Mazo, C Salinesi… - Requirements …, 2016 - Springer
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …

A STAMP-based ontology approach to support safety and security analyses

DP Pereira, C Hirata, S Nadjm-Tehrani - Journal of Information Security and …, 2019 - Elsevier
Considerations of safety and security in the early stage of system life cycle are essential to
collect and prioritize operation needs, determine feasibility of the desired system, and …

COPri v. 2—A core ontology for privacy requirements

M Gharib, P Giorgini, J Mylopoulos - Data & Knowledge Engineering, 2021 - Elsevier
Nowadays, most enterprises collect, store, and manage personal information of customers to
deliver their services. In such a setting, privacy has emerged as a key concern since …