Review of cybersecurity assessment methods: Applicability perspective

R Leszczyna - Computers & Security, 2021 - Elsevier
Cybersecurity assessments are crucial in building the assurance that vital cyberassets are
effectively protected from threats. Multiple assessment methods have been proposed during …

Stram: Measuring the trustworthiness of computer-based systems

JH Cho, S Xu, PM Hurley, M Mackay… - ACM Computing …, 2019 - dl.acm.org
Various system metrics have been proposed for measuring the quality of computer-based
systems, such as dependability and security metrics for estimating their performance and …

Counterattacking cyber threats: A framework for the future of cybersecurity

MF Safitra, M Lubis, H Fakhrurroja - Sustainability, 2023 - mdpi.com
Amidst the rapid advancements in the digital landscape, the convergence of digitization and
cyber threats presents new challenges for organizational security. This article presents a …

Scalable risk assessment method for cloud computing using game theory (CCRAM)

E Furuncu, I Sogukpinar - Computer Standards & Interfaces, 2015 - Elsevier
Cloud computing is one of the most popular information processing concepts of today's IT
world. The security of the cloud computing is complicated because each service model uses …

Conceptualising a cloud business intelligence security evaluation framework for small and medium enterprises in small towns of the Limpopo Province, South Africa

M Moyo, M Loock - Information, 2021 - mdpi.com
The purpose of this study was to investigate security evaluation practices among small and
medium enterprises (SMEs) in small South African towns when adopting cloud business …

Automating risk analysis of software design models

M Frydman, G Ruiz, E Heymann… - The Scientific World …, 2014 - Wiley Online Library
The growth of the internet and networked systems has exposed software to an increased
amount of security threats. One of the responses from software developers to these threats is …

Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis

R Leszczyna - Journal of Computer Information Systems, 2023 - Taylor & Francis
Recently, a survey of cybersecurity assessment methods focused on general characteristics
was conducted. Among its major findings, it revealed the methods' adoption issues. This …

An in-depth security assessment of maritime container terminal software systems

JO Eichenhofer, E Heymann, BP Miller, A Kang - IEEE Access, 2020 - ieeexplore.ieee.org
Attacks on software systems occur world-wide on a daily basis targeting individuals,
corporations, and governments alike. The systems that facilitate maritime ship** are at risk …

Automated tracing and visualization of software security structure and properties

W Fang, BP Miller, JA Kupsch - … of the ninth international symposium on …, 2012 - dl.acm.org
Visualizing a program's structure and security characteristics is the intrinsic part of in-depth
software security assessment. Such an assessment is typically an analyst-driven task. The …

Secure mobile cloud computing and security issues

Q Gu, M Guirguis - High performance cloud auditing and applications, 2013 - Springer
The proliferation of mobile devices, coupled by the increase in their capabilities, have
enabled the establishment of a rich mobile computing platform that can be utilized in …