[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann, AN Kia… - The Geneva papers …, 2022 - ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

A systematic security assessment and review of internet of things in the context of authentication

M Saqib, AH Moon - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …

Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix

W Xiong, E Legrand, O Åberg, R Lagerström - Software and Systems …, 2022 - Springer
Enterprise systems are growing in complexity, and the adoption of cloud and mobile
services has greatly increased the attack surface. To proactively address these security …

Modeling, detecting, and mitigating threats against industrial healthcare systems: a combined software defined networking and reinforcement learning approach

P Radoglou-Grammatikis, K Rompolos… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The rise of the Internet of Medical Things introduces the healthcare ecosystem in a new
digital era with multiple benefits, such as remote medical assistance, real-time monitoring …

[HTML][HTML] Penetration testing of connected households

F Heiding, E Süren, J Olegård, R Lagerström - Computers & Security, 2023 - Elsevier
Connected devices have become an integral part of modern homes and household devices,
such as vacuum cleaners and refrigerators, are now often connected to networks. This …

Cyber security perspectives in public spaces: drone case study

W Shafik - Handbook of research on cybersecurity risk in …, 2023 - igi-global.com
As the public use drones (aircraft that can operate semi or autonomous), sometimes referred
to as unmanned aerial vehicles or automotive aircrafts, to ease daily people's lifestyles …

Cleaning the NVD: Comprehensive quality assessment, improvements, and analyses

A Anwar, A Abusnaina, S Chen, F Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Vulnerability databases are vital sources of information on emergent software security
concerns. Security professionals, from system administrators to developers to researchers …

Cybersecurity in unmanned aerial vehicles (UAVs)

B Ly, R Ly - Journal of cyber security technology, 2021 - Taylor & Francis
For the investigation, the security factor is crucial as Unmanned Aerial Vehicles (UAVs)
become prevalent, and their operational range grows exponentially. This research is a …

Attack graph-based moving target defense in software-defined networks

S Yoon, JH Cho, DS Kim, TJ Moore… - … on Network and …, 2020 - ieeexplore.ieee.org
Moving target defense (MTD) has emerged as a proactive defense mechanism aiming to
thwart a potential attacker. The key underlying idea of MTD is to increase uncertainty and …

Cybersecurity in unmanned aerial vehicles: A review

W Shafik, SM Matinkhah, F Shokoor - International Journal on Smart …, 2023 - sciendo.com
Context: With the rapid advancement of unmanned aerial vehicle (UAV) technology,
ensuring these autonomous systems' security and integrity is paramount. UAVs are …