MITRE ATT&CK-driven cyber risk assessment
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …
understanding the methods and tactics adversaries use to attack an organisation. The …
GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments
I Kalderemidis, A Farao, P Bountakas… - Proceedings of the 17th …, 2022 - dl.acm.org
Investments on cybersecurity are essential for organizations to protect operational activities,
develop trust relationships with clients, and maintain financial stability. A cybersecurity …
develop trust relationships with clients, and maintain financial stability. A cybersecurity …
HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles
The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each
other and with road infrastructure on a common network, has promising socio-economic …
other and with road infrastructure on a common network, has promising socio-economic …
Cybersecurity in robotics: Challenges, quantitative modeling, and practice
Robotics is becoming more and more ubiquitous, but the pressure to bring systems to
market occasionally goes at the cost of neglecting security mechanisms during the …
market occasionally goes at the cost of neglecting security mechanisms during the …
Cyber risk assessment and optimization: A small business case study
M Tsiodra, S Panda, M Chronopoulos… - IEEE Access, 2023 - ieeexplore.ieee.org
Assessing and controlling cyber risk is the cornerstone of information security management,
but also a formidable challenge for organisations due to the uncertainties associated with …
but also a formidable challenge for organisations due to the uncertainties associated with …
Privacy impact assessment of cyber attacks on connected and autonomous vehicles
Connected and autonomous vehicles (CAVs) are vulnerable to security gaps that can result
in serious consequences, including cyber-physical and privacy risks. For example, an …
in serious consequences, including cyber-physical and privacy risks. For example, an …
Research on optimization of array honeypot defense strategies based on evolutionary game theory
L Shi, X Wang, H Hou - Mathematics, 2021 - mdpi.com
Honeypot has been regarded as an active defense technology that can deceive attackers by
simulating real systems. However, honeypot is actually a static network trap with fixed …
simulating real systems. However, honeypot is actually a static network trap with fixed …
Securing Blockchain-based IoT Systems: A Review
This paper reviews the role of blockchain technology in enhancing the security of Internet of
Things (IoT) systems and maintaining data integrity. We address the increased …
Things (IoT) systems and maintaining data integrity. We address the increased …
A survey of anomaly detection methods for power grids
S Madabhushi, R Dewri - International Journal of Information Security, 2023 - Springer
The power grid is a constant target for attacks as they have the potential to affect a large
geographical location, thus affecting hundreds of thousands of customers. With the advent of …
geographical location, thus affecting hundreds of thousands of customers. With the advent of …
Optimising user security recommendations for AI-powered smart-homes
Research in the context of user awareness has shown that smart-home occupants often lack
cybersecurity awareness even when it comes to frequently used technologies such as …
cybersecurity awareness even when it comes to frequently used technologies such as …