Survey on intrusion detection systems based on machine learning techniques for the protection of critical infrastructure

A Pinto, LC Herrera, Y Donoso, JA Gutierrez - Sensors, 2023 - mdpi.com
Industrial control systems (ICSs), supervisory control and data acquisition (SCADA) systems,
and distributed control systems (DCSs) are fundamental components of critical infrastructure …

[HTML][HTML] From cobit to iso 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models

TR McIntosh, T Susnjak, T Liu, P Watters, D Xu… - Computers & …, 2024 - Elsevier
This study investigated the integration readiness of four predominant cybersecurity
Governance, Risk and Compliance (GRC) frameworks–NIST CSF 2.0, COBIT 2019, ISO …

Information security risk assessment methods in cloud computing: Comprehensive review

T Ali, M Al-Khalidi, R Al-Zaidi - Journal of Computer Information …, 2024 - Taylor & Francis
Cloud computing faces more security threats, requiring better security measures. This paper
examines the various classification and categorization schemes for cloud computing security …

[HTML][HTML] The effect of environmental turbulence on cyber security risk management and organizational resilience

S Durst, C Hinteregger, M Zieba - Computers & Security, 2024 - Elsevier
Even though there is a plethora of research on the role of environmental turbulence in
organizational performance in general, little attention has been paid to the effect of …

[PDF][PDF] Enhancing Cybersecurity through Automated Infrastructure Management: A Comprehensive Study on Optimizing Security Measures

A Yaseen - Quarterly Journal of Emerging Technologies and …, 2024 - researchgate.net
The present research discusses the integration of Automated Infrastructure Management
(AIM) in fortifying cybersecurity measures within organizational settings. The study employs …

Strategic role of trust in digital communication: critical insights into building organizational sustainability

M Huda, AH Borham, A Hashim, M Ritonga… - Proceedings of the …, 2023 - Springer
The recent trends of managing the way on how to achieve the communication with safe
cyberspace paid a particular attention among the scholarly worldwide. The strategic initiative …

[PDF][PDF] Reviewing third-party risk management: best practices in accounting and cybersecurity for superannuation organizations

TO Abrahams, OA Farayola, S Kaggwa… - Finance & Accounting …, 2024 - academia.edu
Abrahams, Farayola, Kaggwa, Uwaoma, Hassan, & Dawodu, P. No. 21-39 Page 22
vulnerabilities and advocates for a proactive approach to cybersecurity risk management …

Methodology for predictive cyber security risk assessment (PCSRA)

DJ Ferreira, N Mateus-Coelho, HS Mamede - Procedia Computer Science, 2023 - Elsevier
With the current impulse of Cyberattacks, data becomes of central importance. There are
many challenges in how they are used that also need to be discussed. Defining the suitable …

Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arxiv preprint arxiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

[HTML][HTML] Enhanced threat intelligence framework for advanced cybersecurity resilience

M Alazab, RA Khurma, M García-Arenas… - Egyptian Informatics …, 2024 - Elsevier
The increasing severity of cyber-attacks against organizations emphasizes the necessity for
efficient threat intelligence. This article presents a novel multi-layered architecture for threat …