The impact of artificial intelligence on data system security: A literature review

R Raimundo, A Rosário - Sensors, 2021 - mdpi.com
Diverse forms of artificial intelligence (AI) are at the forefront of triggering digital security
innovations based on the threats that are arising in this post-COVID world. On the one hand …

[HTML][HTML] Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic map** review

ID Sánchez-García, TSF Gilabert… - Computers & Security, 2023 - Elsevier
Cybersecurity continues to be one of the principal issues in the computing environment.
Organizations and researchers have made various efforts to mitigate the risks of cyberspace …

Enhancing zero trust models in the financial industry through blockchain integration: A proposed framework

C Daah, A Qureshi, I Awan, S Konur - Electronics, 2024 - mdpi.com
As financial institutions navigate an increasingly complex cyber threat landscape and
regulatory ecosystem, there is a pressing need for a robust and adaptive security …

[HTML][HTML] Hybrid ontology for safety, security, and dependability risk assessments and Security Threat Analysis (STA) method for industrial control systems

J Alanen, J Linnosmaa, T Malm… - Reliability Engineering & …, 2022 - Elsevier
This paper introduces a model-based methodology for hybrid reliability, availability,
maintainability, safety, and security (RAMSS) risk assessment management, which extends …

An ontology-based security risk management model for information systems

OT Arogundade, A Abayomi-Alli, S Misra - Arabian Journal for Science and …, 2020 - Springer
Security risk management is a knowledge-intensive procedure that requires monitoring and
capturing relevant information that can assist in making the right decision by managers. In …

Security standard compliance and continuous verification for Industrial Internet of Things

A Bicaku, M Tauber, J Delsing - International Journal of …, 2020 - journals.sagepub.com
Due to globalization and digitalization of industrial systems, standard compliance is gaining
more attention. In order to stay competitive and remain in business, different sectors within …

[HTML][HTML] Ontologies in cloud computing—review and future directions

JB Agbaegbu, OT Arogundade, S Misra… - Future Internet, 2021 - mdpi.com
Cloud computing as a technology has the capacity to enhance cooperation, scalability,
accessibility, and offers discount prospects using improved and effective computing, and this …

A real-world information security performance assessment using a multidimensional socio-technical approach

K Prislan, A Mihelič, I Bernik - PloS one, 2020 - journals.plos.org
Measuring the performance of information security is an essential part of the information
security management system within organisations. Studies in the past mainly focused on …

[HTML][HTML] Seconto: Ontological Representation of Security Directives

G Castiglione, G Bella, DF Santamaria - Computers & Security, 2025 - Elsevier
The current digital landscape demands robust security requirements and, for doing so, the
institutions enact complex security directives to protect the citizens and the infrastructures …

Security Analysis Of Simpel Desa Using Mobile Security Framework And Iso 27002: 2013

KN Isnaini, D Suhartono - Intensif: Jurnal Ilmiah Penelitian Dan …, 2023 - ojs.unpkediri.ac.id
Abstract The Personal Identification Number or KTP is prone to be stolen and used by
unwanted parties, this is also a possibility for the Simpel Desa, a village administration …