Machine learning in cybersecurity: a comprehensive survey
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …
The future cybersecurity workforce: Going beyond technical skills for successful cyber performance
One of the challenges in writing an article reviewing the current state of cyber education and
workforce development is that there is a paucity of quantitative assessment regarding the …
workforce development is that there is a paucity of quantitative assessment regarding the …
The future of risk assessment
E Zio - Reliability Engineering & System Safety, 2018 - Elsevier
Risk assessment must evolve for addressing the existing and future challenges, and
considering the new systems and innovations that have already arrived in our lives and that …
considering the new systems and innovations that have already arrived in our lives and that …
Evolution of safety and security risk assessment methodologies towards the use of bayesian networks in process industries
PG George, VR Renjith - Process Safety and Environmental Protection, 2021 - Elsevier
Process Industries handling, producing and storing bulk amount of hazardous materials are
a major source of concern in terms of both safety and security. Safety and security cannot be …
a major source of concern in terms of both safety and security. Safety and security cannot be …
Leveraging a Bayesian network approach to model and analyze supplier vulnerability to severe weather risk: A case study of the US pharmaceutical supply chain …
JM Lawrence, NUI Hossain, R Jaradat… - International Journal of …, 2020 - Elsevier
Abstract The United States government has identified the health care sector as part of the
critical infrastructure for homeland security to protect citizens against health risks arising …
critical infrastructure for homeland security to protect citizens against health risks arising …
Mapping the values of IoT
R Nicolescu, M Huth, P Radanliev… - Journal of Information …, 2018 - journals.sagepub.com
We investigate the emerging meanings of “value” associated with the Internet of Things.
Given the current political economy, we argue that the multiple meanings of “value” cannot …
Given the current political economy, we argue that the multiple meanings of “value” cannot …
Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory
Cybersecurity, which is defined as information security aimed at averting cyberattacks, which
are among the main issues caused by the extensive use of networks in industrial control …
are among the main issues caused by the extensive use of networks in industrial control …
Explainable AI methods in cyber risk management
P Giudici, E Raffinetti - Quality and reliability engineering …, 2022 - Wiley Online Library
Artificial intelligence (AI) methods are becoming widespread, especially when data are not
sufficient to build classical statistical models, as is the case for cyber risk management …
sufficient to build classical statistical models, as is the case for cyber risk management …
Security perspective analysis of industrial cyber physical systems (I-CPS): A decade-wide survey
Considering the exceptional growth of Cyber Physical Systems (CPSs), multiple and
potentially grave security challenges have emerged in this field. Different vulnerabilities and …
potentially grave security challenges have emerged in this field. Different vulnerabilities and …
Developing decision support for cybersecurity threat and incident managers
R van der Kleij, JM Schraagen, B Cadet, H Young - Computers & Security, 2022 - Elsevier
Cybersecurity threat and incident managers in large organizations, especially in the
financial sector, are confronted more and more with an increase in volume and complexity of …
financial sector, are confronted more and more with an increase in volume and complexity of …