A review of visualization methods for cyber-physical security: Smart grid case study
V Cobilean, HS Mavikumbure, BJ Mcbride… - IEEE …, 2023 - ieeexplore.ieee.org
Cyber-Physical Systems (CPSs) are becoming increasingly complex and interconnected as
they attempt to meet the demands of evolving society. As a result, monitoring and …
they attempt to meet the demands of evolving society. As a result, monitoring and …
A grounded theory of the role of coordination in software security patch management
Several disastrous security attacks can be attributed to delays in patching software
vulnerabilities. While researchers and practitioners have paid significant attention to …
vulnerabilities. While researchers and practitioners have paid significant attention to …
Combining SABSA and Vis4Sec to the Process Framework IdMSecMan to Continuously Improve Identity Management Security in Heterogeneous ICT Infrastructures
Identity management ensures that users have appropriate access to resources, such as ICT
services and data. Thereby, identity management does not only identify, authenticate, and …
services and data. Thereby, identity management does not only identify, authenticate, and …
Towards Improving Identity and Access Management with the IdMSecMan Process Framework
In today's networks, administrative access to Linux servers is commonly managed by
Privileged Access Management (PAM). It is not only important to monitor these privileged …
Privileged Access Management (PAM). It is not only important to monitor these privileged …
Understanding Socio-Technical Aspects of Software Security Patch Management
NN Munasinghe - 2023 - digital.library.adelaide.edu.au
Several security attacks that resulted in catastrophic outcomes including system downtime,
data breaches, financial losses, reputational damage, and in some cases, loss of life, can be …
data breaches, financial losses, reputational damage, and in some cases, loss of life, can be …
Enhancing Enterprise IT Security with a Visualization-Based Process Framework
T Hanauer, W Hommel - … Symposium on Security in Computing and …, 2019 - Springer
This work presents a process framework for security visualization that supports
organizational knowledge generation, improves the usability of IT operative tasks, and …
organizational knowledge generation, improves the usability of IT operative tasks, and …
Stakeholder security analysis-a new approach to security design with example application
NMH Hadaad - 2020 - research.usq.edu.au
Stakeholder security analysis (SSA) is a rigorous approach to analysing and designing
systems from the point of view of cybersecurity which is defined and applied in this …
systems from the point of view of cybersecurity which is defined and applied in this …