Machine learning in cybersecurity: a comprehensive survey

D Dasgupta, Z Akhtar, S Sen - The Journal of Defense …, 2022 - journals.sagepub.com
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …

The future cybersecurity workforce: Going beyond technical skills for successful cyber performance

J Dawson, R Thomson - Frontiers in psychology, 2018 - frontiersin.org
One of the challenges in writing an article reviewing the current state of cyber education and
workforce development is that there is a paucity of quantitative assessment regarding the …

The future of risk assessment

E Zio - Reliability Engineering & System Safety, 2018 - Elsevier
Risk assessment must evolve for addressing the existing and future challenges, and
considering the new systems and innovations that have already arrived in our lives and that …

Evolution of safety and security risk assessment methodologies towards the use of bayesian networks in process industries

PG George, VR Renjith - Process Safety and Environmental Protection, 2021 - Elsevier
Process Industries handling, producing and storing bulk amount of hazardous materials are
a major source of concern in terms of both safety and security. Safety and security cannot be …

Leveraging a Bayesian network approach to model and analyze supplier vulnerability to severe weather risk: A case study of the US pharmaceutical supply chain …

JM Lawrence, NUI Hossain, R Jaradat… - International Journal of …, 2020 - Elsevier
Abstract The United States government has identified the health care sector as part of the
critical infrastructure for homeland security to protect citizens against health risks arising …

Mapping the values of IoT

R Nicolescu, M Huth, P Radanliev… - Journal of Information …, 2018 - journals.sagepub.com
We investigate the emerging meanings of “value” associated with the Internet of Things.
Given the current political economy, we argue that the multiple meanings of “value” cannot …

Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory

APH de Gusmão, MM Silva, T Poleto, LC e Silva… - International Journal of …, 2018 - Elsevier
Cybersecurity, which is defined as information security aimed at averting cyberattacks, which
are among the main issues caused by the extensive use of networks in industrial control …

Explainable AI methods in cyber risk management

P Giudici, E Raffinetti - Quality and reliability engineering …, 2022 - Wiley Online Library
Artificial intelligence (AI) methods are becoming widespread, especially when data are not
sufficient to build classical statistical models, as is the case for cyber risk management …

Security perspective analysis of industrial cyber physical systems (I-CPS): A decade-wide survey

N Agrawal, R Kumar - ISA transactions, 2022 - Elsevier
Considering the exceptional growth of Cyber Physical Systems (CPSs), multiple and
potentially grave security challenges have emerged in this field. Different vulnerabilities and …

Developing decision support for cybersecurity threat and incident managers

R van der Kleij, JM Schraagen, B Cadet, H Young - Computers & Security, 2022 - Elsevier
Cybersecurity threat and incident managers in large organizations, especially in the
financial sector, are confronted more and more with an increase in volume and complexity of …