MITRE ATT&CK-driven cyber risk assessment
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …
understanding the methods and tactics adversaries use to attack an organisation. The …
A systematic literature review of cyber insurance challenges
B Aziz - … Conference on Information Technology Systems and …, 2020 - ieeexplore.ieee.org
This paper presents a systematic literature review of the challenges in cyber insurance. The
study uses PRISMA to obtain transparent results. This review summarized sectors which risk …
study uses PRISMA to obtain transparent results. This review summarized sectors which risk …
GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments
I Kalderemidis, A Farao, P Bountakas… - Proceedings of the 17th …, 2022 - dl.acm.org
Investments on cybersecurity are essential for organizations to protect operational activities,
develop trust relationships with clients, and maintain financial stability. A cybersecurity …
develop trust relationships with clients, and maintain financial stability. A cybersecurity …
HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles
The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each
other and with road infrastructure on a common network, has promising socio-economic …
other and with road infrastructure on a common network, has promising socio-economic …
AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks
G Petihakis, A Farao, P Bountakas, A Sabazioti… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing integration of Artificial Intelligence (AI) in critical sectors such as healthcare,
finance, and cybersecurity has simultaneously exposed these systems to unique …
finance, and cybersecurity has simultaneously exposed these systems to unique …
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain
Despite the rapid growth of the cyber insurance market in recent years, insurance
companies in this area face several challenges, such as a lack of data, a shortage of …
companies in this area face several challenges, such as a lack of data, a shortage of …
A Bring Your Own Device security awareness survey among professionals
The increasing prevalence of Bring Your Own Device (BYOD) practices in the workplace has
posed significant challenges to organizations in terms of security and management. This …
posed significant challenges to organizations in terms of security and management. This …
Privacy impact assessment of cyber attacks on connected and autonomous vehicles
Connected and autonomous vehicles (CAVs) are vulnerable to security gaps that can result
in serious consequences, including cyber-physical and privacy risks. For example, an …
in serious consequences, including cyber-physical and privacy risks. For example, an …
BRIDGE: BRIDGing the gap bEtween CTI production and consumption
M Karatisoglou, A Farao, V Bolgouras… - 2022 14th …, 2022 - ieeexplore.ieee.org
Security for businesses and organizations is essential to protect operational activities, trust
relationship with clients and financial viability. Increased interest for research concerning …
relationship with clients and financial viability. Increased interest for research concerning …
Optimising user security recommendations for AI-powered smart-homes
Research in the context of user awareness has shown that smart-home occupants often lack
cybersecurity awareness even when it comes to frequently used technologies such as …
cybersecurity awareness even when it comes to frequently used technologies such as …