Shielding networks: enhancing intrusion detection with hybrid feature selection and stack ensemble learning

AM Alsaffar, M Nouri-Baygi, HM Zolbanin - Journal of Big Data, 2024 - Springer
The frequent usage of computer networks and the Internet has made computer networks
vulnerable to numerous attacks, highlighting the critical need to enhance the precision of …

Automated cyber and privacy risk management toolkit

G Gonzalez-Granadillo, SA Menesidou… - Sensors, 2021 - mdpi.com
Addressing cyber and privacy risks has never been more critical for organisations. While a
number of risk assessment methodologies and software tools are available, it is most often …

Quality matters: Evoking subjective norms and co** appraisals by system design to increase security intentions

M Grimes, J Marquardson - Decision Support Systems, 2019 - Elsevier
The efficacy of direct messages such as threats, warnings, reminders, and training for
influencing information security intentions is well established. Despite the pervasiveness of …

Conducting online focus groups-practical advice for information systems researchers

L Schulze, M Trenz, Z Cai, CW Tan - Communications of the …, 2023 - aisel.aisnet.org
Video-based online focus groups (OFGs) present an emerging opportunity for Information
Systems (IS) researchers to circumvent spatial and temporal constraints in collecting rich …

[HTML][HTML] Enhancing intrusion detection systems with dimensionality reduction and multi-stacking ensemble techniques

AM Alsaffar, M Nouri-Baygi, H Zolbanin - Algorithms, 2024 - mdpi.com
The deployment of intrusion detection systems (IDSs) is essential for protecting network
resources and infrastructure against malicious threats. Despite the wide use of various …

Mission‐centric decision support in cybersecurity via Bayesian Privilege Attack Graph

M Javorník, M Husák - Engineering Reports, 2022 - Wiley Online Library
We present an approach to decision support in cybersecurity with respect to cyber threats
and stakeholders' requirements. We approach situations in which cybersecurity experts …

MASISCo—Methodological Approach for the Selection of Information Security Controls

M Diéguez, C Cares, C Cachero, J Hochstetter - Applied Sciences, 2023 - mdpi.com
As cyber-attacks grow worldwide, companies have begun to realize the importance of being
protected against malicious actions that seek to violate their systems and access their …

[PDF][PDF] Optimal strategies for cyber security decision-making

S Panda - 2022 - openresearch.surrey.ac.uk
One of the major concerns of organisations is how to protect themselves from the growing
volume and sophistication of cyber attacks. In this context, methodologies, models, and …

[PDF][PDF] Comparación de dos enfoques cuantitativos para seleccionar controles de seguridad de la información

M Diéguez, C Cares - Revista Ibérica de Sistemas e Tecnologias de …, 2019 - academia.edu
Proporcionar procesos y herramientas sistemáticos para tomar una decisión sobre
inversiones en seguridad en un escenario con restricciones presupuestarias, es de suma …

A stochastic optimisation model to support cybersecurity within the UK national health service

E Grass, C Pagel, S Crowe, S Ghafur - Journal of the Operational …, 2024 - Taylor & Francis
Over the past decade, the adoption of new digital technologies in healthcare has surged,
significantly enhancing care delivery and accessibility. However, this digital transformation …