[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
Humans and automation: Augmenting security operation centers
Background: Open Access Systematic Review Humans and Automation: Augmenting
Security Operation Centers by Jack Tilbury and Stephen Flowerday* School of Cyber …
Security Operation Centers by Jack Tilbury and Stephen Flowerday* School of Cyber …
Enterprise architecture modeling for cybersecurity analysis in critical infrastructures-A systematic literature review
As digital landscapes become increasingly complex, safeguarding sensitive information and
systems against cyber threats has become a paramount concern for organizations. This …
systems against cyber threats has become a paramount concern for organizations. This …
Managing the Inevitable–A Maturity Model to Establish Incident Response Management Capabilities
M Bitzer, B Häckel, D Leuthe, J Ott, B Stahl… - Computers & Security, 2023 - Elsevier
Although the ongoing digital transformation offers new opportunities for organizations, more
emphasis on information security is needed due to the evolving cyber-threat landscape …
emphasis on information security is needed due to the evolving cyber-threat landscape …
[HTML][HTML] Understanding situation awareness in SOCs, a systematic literature review
Situation awareness is shown through human factors research to be a valuable construct to
understand and improve how humans perform while operating complex systems in critical …
understand and improve how humans perform while operating complex systems in critical …
[HTML][HTML] Automation Bias and Complacency in Security Operation Centers
The volume and complexity of alerts that security operation center (SOC) analysts must
manage necessitate automation. Increased automation in SOCs amplifies the risk of …
manage necessitate automation. Increased automation in SOCs amplifies the risk of …
[HTML][HTML] A comprehensive review and assessment of cybersecurity vulnerability detection methodologies
The number of new vulnerabilities continues to rise significantly each year. Simultaneously,
vulnerability databases have challenges in promptly sharing new security events with …
vulnerability databases have challenges in promptly sharing new security events with …
SoK: applications and challenges of using recommender systems in cybersecurity incident handling and response
M Husák, M Čermák - Proceedings of the 17th International Conference …, 2022 - dl.acm.org
Incident handling, a fundamental activity of a cybersecurity incident response team, is a
complex discipline that consumes a significant amount of personnel's time and costs. There …
complex discipline that consumes a significant amount of personnel's time and costs. There …
'We Do Not Have the Capacity to Monitor All Media': A Design Case Study on Cyber Situational Awareness in Computer Emergency Response Teams
Computer Emergency Response Teams (CERTs) provide advisory, preventive and reactive
cybersecurity services for authorities, citizens, and businesses. However, their responsibility …
cybersecurity services for authorities, citizens, and businesses. However, their responsibility …
[HTML][HTML] Reducing the risk of social engineering attacks using SOAR measures in a real world environment: A case study
S Waelchli, Y Walter - Computers & Security, 2025 - Elsevier
The global cost of successful cyberattacks is increasing annually, with there being a shift
towards social engineering threats in recent years. Cybercriminals are increasingly targeting …
towards social engineering threats in recent years. Cybercriminals are increasingly targeting …