[HTML][HTML] Onto-CARMEN: ontology-driven approach for cyber–physical system security requirements meta-modelling and reasoning

C Blanco, DG Rosado, ÁJ Varela-Vaca… - Internet of Things, 2023 - Elsevier
In the last years, Cyber–physical systems (CPS) have attracted substantial mainstream,
especially in the industrial sector, since they have become the focus of cyber-attacks. CPS …

[PDF][PDF] The enterprise economic security system: the state assessment using management functional types

O Illiashenko, Y Rudnichenko, T Momot… - International Journal for …, 2020 - ijqr.net
The use of the model of the state assessment of an enterprise economic security system
allows to get a general assessment of the system state and its balance by type of …

CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines

ÁJ Varela-Vaca, R M. Gasca, R Ceballos… - Applied Sciences, 2019 - mdpi.com
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations.
Such disadvantages may be due to the absence of security configurations or the use of …

Optimization of the Sources Structure of Financing the Implementation of Strategic Guidelines for Ensuring the Economic Security of Investment Activities of an …

O Zlotenko, Y Rudnichenko, O Illiashenko… - Tem Journal, 2019 - ceeol.com
The purpose of the research is to determine the optimal structure for financing the
investment activities of industrial enterprises in the context of ensuring the economic security …

Definition and verification of security configurations of cyber-physical systems

ÁJ Varela-Vaca, DG Rosado, LE Sánchez… - … Security: ESORICS 2020 …, 2020 - Springer
Abstract The proliferation of Cyber-Physical Systems (CPSs) is raising serious security
challenges. These are complex systems, integrating physical elements into automated …

Process instance query language to include process performance indicators in DMN

JM Perez-Alvarez, MT Gomez-Lopez… - 2016 IEEE 20th …, 2016 - ieeexplore.ieee.org
Companies are increasingly incorporating commercial Business Process Management
Systems (BPMSs) as mechanisms to automate their daily procedures. These BPMSs …

An Approach for Verification of Secure Access Control Using Security Pattern

C Gupta, RK Singh… - … and mobile computing, 2022 - Wiley Online Library
According to OWASP‐2021, more than 3, 00,000 web applications have been detected for
unauthenticated and unauthorised access leading to a breach of security trust. Security …

Optimization of Information Analytical Support for Assessing the Reliability of Counterparties from the Standpoint of Economic Security.

L Hnylytska, I Gavrylychenko, S Melnyk, O Illiashenko… - TEM Journal, 2021 - ceeol.com
To solve the problem of finding effective methodological approaches that would make it
possible to determine the level of security of relations with market entities with a high degree …

Implementation of managerial innovations in the system of providing economic security for subjects of foreign economic activity

YM Rudnichenko, NI Havlovska… - Науковий вісник …, 2018 - nvp.stu.cn.ua
Анотація Актуальність теми дослідження. Активізація трансформаційних процесів у
зовнішньоекономічних відносинах і необхідність пошуку нових ринків збуту продукції …

Formally Modeled Common Weakness Enumerations (CWEs)

V Koscinski, M Mirakhorli - Proceedings of the 39th IEEE/ACM …, 2024 - dl.acm.org
The Common Weakness Enumeration is a community-developed list of common software
weaknesses, also known as CWEs, that could lead to exploitable security vulnerabilities …