Shielding networks: enhancing intrusion detection with hybrid feature selection and stack ensemble learning
The frequent usage of computer networks and the Internet has made computer networks
vulnerable to numerous attacks, highlighting the critical need to enhance the precision of …
vulnerable to numerous attacks, highlighting the critical need to enhance the precision of …
Automated cyber and privacy risk management toolkit
Addressing cyber and privacy risks has never been more critical for organisations. While a
number of risk assessment methodologies and software tools are available, it is most often …
number of risk assessment methodologies and software tools are available, it is most often …
Quality matters: Evoking subjective norms and co** appraisals by system design to increase security intentions
The efficacy of direct messages such as threats, warnings, reminders, and training for
influencing information security intentions is well established. Despite the pervasiveness of …
influencing information security intentions is well established. Despite the pervasiveness of …
Conducting online focus groups-practical advice for information systems researchers
Video-based online focus groups (OFGs) present an emerging opportunity for Information
Systems (IS) researchers to circumvent spatial and temporal constraints in collecting rich …
Systems (IS) researchers to circumvent spatial and temporal constraints in collecting rich …
[HTML][HTML] Enhancing intrusion detection systems with dimensionality reduction and multi-stacking ensemble techniques
The deployment of intrusion detection systems (IDSs) is essential for protecting network
resources and infrastructure against malicious threats. Despite the wide use of various …
resources and infrastructure against malicious threats. Despite the wide use of various …
Mission‐centric decision support in cybersecurity via Bayesian Privilege Attack Graph
We present an approach to decision support in cybersecurity with respect to cyber threats
and stakeholders' requirements. We approach situations in which cybersecurity experts …
and stakeholders' requirements. We approach situations in which cybersecurity experts …
MASISCo—Methodological Approach for the Selection of Information Security Controls
As cyber-attacks grow worldwide, companies have begun to realize the importance of being
protected against malicious actions that seek to violate their systems and access their …
protected against malicious actions that seek to violate their systems and access their …
[PDF][PDF] Optimal strategies for cyber security decision-making
S Panda - 2022 - openresearch.surrey.ac.uk
One of the major concerns of organisations is how to protect themselves from the growing
volume and sophistication of cyber attacks. In this context, methodologies, models, and …
volume and sophistication of cyber attacks. In this context, methodologies, models, and …
[PDF][PDF] Comparación de dos enfoques cuantitativos para seleccionar controles de seguridad de la información
Proporcionar procesos y herramientas sistemáticos para tomar una decisión sobre
inversiones en seguridad en un escenario con restricciones presupuestarias, es de suma …
inversiones en seguridad en un escenario con restricciones presupuestarias, es de suma …
A stochastic optimisation model to support cybersecurity within the UK national health service
Over the past decade, the adoption of new digital technologies in healthcare has surged,
significantly enhancing care delivery and accessibility. However, this digital transformation …
significantly enhancing care delivery and accessibility. However, this digital transformation …