[HTML][HTML] A review of cyber security risk assessment methods for SCADA systems

Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones… - Computers & …, 2016 - Elsevier
This paper reviews the state of the art in cyber security risk assessment of Supervisory
Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four …

Riskio: A serious game for cyber security awareness and education

S Hart, A Margheri, F Paci, V Sassone - Computers & Security, 2020 - Elsevier
Cyber attacks are increasing in number and sophistication, causing organisations to
continuously adapt management strategies for cyber security risks. As a key risk mitigation …

[HTML][HTML] Acceptance behavior theories and models in software engineering—A map** study

J Börstler, N bin Ali, K Petersen, E Engström - Information and Software …, 2024 - Elsevier
Context: The adoption or acceptance of new technologies or ways of working in software
development activities is a recurrent topic in the software engineering literature. The topic …

An effective security requirements engineering framework for cyber-physical systems

SU Rehman, V Gruhn - Technologies, 2018 - mdpi.com
Context and motivation: Cyber-Physical Systems (CPSs) are gaining priority over other
systems. The heterogeneity of these systems increases the importance of security. Both the …

The battle for New York: A case study of applied digital threat modeling at the enterprise level

R Stevens, D Votipka, EM Redmiles, C Ahern… - 27th USENIX Security …, 2018 - usenix.org
Digital security professionals use threat modeling to assess and improve the security
posture of an organization or product. However, no threat-modeling techniques have been …

Identifying relevant information cues for vulnerability assessment using CVSS

L Allodi, S Banescu, H Femmer, K Beckers - Proceedings of the Eighth …, 2018 - dl.acm.org
The assessment of new vulnerabilities is an activity that accounts for information from
several data sources and produces a'severity'score for the vulnerability. The Common …

Two architectural threat analysis techniques compared

K Tuma, R Scandariato - … Conference on Software Architecture, ECSA 2018 …, 2018 - Springer
In an initial attempt to systematize the research field of architectural threat analysis, this
paper presents a comparative study of two threat analysis techniques. In particular, the …

Finding security threats that matter: Two industrial case studies

K Tuma, C Sandberg, U Thorsson, M Widman… - Journal of Systems and …, 2021 - Elsevier
In the past decade, speed has become an essential trait of software development (eg, agile,
continuous integration, DevOps) and any inefficiency is considered unaffordable time …

Security requirements engineering: A framework for cyber-physical systems

S ur Rehman, C Allgaier… - … International conference on …, 2018 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are complex evolution of classical software systems. These
systems integrate the physical layer with software systems, generating the ability for software …

The role of catalogues of threats and security controls in security risk assessment: an empirical study with ATM professionals

M De Gramatica, K Labunets, F Massacci… - … Foundation for Software …, 2015 - Springer
Abstract [Context and motivation] To remedy the lack of security expertise, industrial security
risk assessment methods come with catalogues of threats and security controls.[Question …