[HTML][HTML] A review of cyber security risk assessment methods for SCADA systems
This paper reviews the state of the art in cyber security risk assessment of Supervisory
Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four …
Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four …
Riskio: A serious game for cyber security awareness and education
Cyber attacks are increasing in number and sophistication, causing organisations to
continuously adapt management strategies for cyber security risks. As a key risk mitigation …
continuously adapt management strategies for cyber security risks. As a key risk mitigation …
[HTML][HTML] Acceptance behavior theories and models in software engineering—A map** study
Context: The adoption or acceptance of new technologies or ways of working in software
development activities is a recurrent topic in the software engineering literature. The topic …
development activities is a recurrent topic in the software engineering literature. The topic …
An effective security requirements engineering framework for cyber-physical systems
Context and motivation: Cyber-Physical Systems (CPSs) are gaining priority over other
systems. The heterogeneity of these systems increases the importance of security. Both the …
systems. The heterogeneity of these systems increases the importance of security. Both the …
The battle for New York: A case study of applied digital threat modeling at the enterprise level
Digital security professionals use threat modeling to assess and improve the security
posture of an organization or product. However, no threat-modeling techniques have been …
posture of an organization or product. However, no threat-modeling techniques have been …
Identifying relevant information cues for vulnerability assessment using CVSS
The assessment of new vulnerabilities is an activity that accounts for information from
several data sources and produces a'severity'score for the vulnerability. The Common …
several data sources and produces a'severity'score for the vulnerability. The Common …
Two architectural threat analysis techniques compared
In an initial attempt to systematize the research field of architectural threat analysis, this
paper presents a comparative study of two threat analysis techniques. In particular, the …
paper presents a comparative study of two threat analysis techniques. In particular, the …
Finding security threats that matter: Two industrial case studies
K Tuma, C Sandberg, U Thorsson, M Widman… - Journal of Systems and …, 2021 - Elsevier
In the past decade, speed has become an essential trait of software development (eg, agile,
continuous integration, DevOps) and any inefficiency is considered unaffordable time …
continuous integration, DevOps) and any inefficiency is considered unaffordable time …
Security requirements engineering: A framework for cyber-physical systems
S ur Rehman, C Allgaier… - … International conference on …, 2018 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are complex evolution of classical software systems. These
systems integrate the physical layer with software systems, generating the ability for software …
systems integrate the physical layer with software systems, generating the ability for software …
The role of catalogues of threats and security controls in security risk assessment: an empirical study with ATM professionals
Abstract [Context and motivation] To remedy the lack of security expertise, industrial security
risk assessment methods come with catalogues of threats and security controls.[Question …
risk assessment methods come with catalogues of threats and security controls.[Question …