[HTML][HTML] Insider threat detection in cyber-physical systems: a systematic literature review
The rapid expansion of cyber-physical systems (CPSs) has introduced new security
challenges, leading to the emergence of various threats, attacks, and controls aimed at …
challenges, leading to the emergence of various threats, attacks, and controls aimed at …
Cyber third-party risk management: A comparison of non-intrusive risk scoring reports
Cybersecurity is a concern for organizations in this era. However, strengthening the security
of an organization's internal network may not be sufficient since modern organizations …
of an organization's internal network may not be sufficient since modern organizations …
COVID-19 and biocybersecurity's increasing role on defending forward
The evolving nature of warfare has been changing with cybersecurity and the use of
advanced biotechnology in each aspect of the society is expanding and overlap** with the …
advanced biotechnology in each aspect of the society is expanding and overlap** with the …
Zero Trust and Advanced Persistent Threats: Who Will Win the War?
Advanced Persistent Threats (APTs) are state-sponsored actors who break into computer
networks for political or industrial espionage. Because of the nature of cyberspace and ever …
networks for political or industrial espionage. Because of the nature of cyberspace and ever …
Complex system governance as a foundation for enhancing the cybersecurity of cyber-physical systems
This article investigates the possible benefits of complex system governance (CSG) as a
foundation for enhancing cybersecurity in critical cyber-physical systems (CPS). CPS are …
foundation for enhancing cybersecurity in critical cyber-physical systems (CPS). CPS are …
Scoring cyber vulnerabilities based on their impact on organizational goals
O Keskin, N Gannon, B Lopez… - 2021 Systems and …, 2021 - ieeexplore.ieee.org
Vulnerability Management, which is a vital part of risk and resiliency management efforts, is
a continuous process of identifying, classifying, prioritizing, and removing vulnerabilities on …
a continuous process of identifying, classifying, prioritizing, and removing vulnerabilities on …
An assessment model to improve national cyber security governance
Today, cyber space has been embraced by individuals, organizations and nations as an
indispensable instrument of daily life. Accordingly, impact of cyber threats has continuously …
indispensable instrument of daily life. Accordingly, impact of cyber threats has continuously …
Evolution of US cybersecurity strategy
This paper explores the evolution of the overall Cybersecurity Strategy of the United States,
analyzing the change in focus as well as effects of events and technology in this change. It …
analyzing the change in focus as well as effects of events and technology in this change. It …
Cybersecurity acquisition framework based on risk management: Economics perspective
Cyber attacks continuously target organizations, however, the mitigation actions taken for
defense are not sufficiently effective. Ability to compute the cost of attacks is crucial to assess …
defense are not sufficiently effective. Ability to compute the cost of attacks is crucial to assess …
Data Analytics for Cyber Risk Analysis Utilizing Cyber Incident Datasets
M Portalatin, O Keskin, S Malneedi… - 2021 Systems and …, 2021 - ieeexplore.ieee.org
The imperative factors of cybersecurity within institutions have become prevalent due to the
rise of cyber-attacks. Cybercriminals strategically choose their targets and develop several …
rise of cyber-attacks. Cybercriminals strategically choose their targets and develop several …