Mass customized/personalized manufacturing in Industry 4.0 and blockchain: Research challenges, main problems, and the design of an information architecture

ATE Perez, DA Rossit, F Tohme, OC Vasquez - Information Fusion, 2022 - Elsevier
Mass customized and mass personalized production has become facilitated by the fourth
industrial revolution. The resulting industrial environments require the development of …

[PDF][PDF] Simulation for cybersecurity: state of the art and future directions

H Kavak, JJ Padilla, D Vernon-Bido… - Journal of …, 2021 - academic.oup.com
In this article, we provide an introduction to simulation for cybersecurity and focus on three
themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …

Cyber third-party risk management: A comparison of non-intrusive risk scoring reports

OF Keskin, KM Caramancion, I Tatar, O Raza, U Tatar - Electronics, 2021 - mdpi.com
Cybersecurity is a concern for organizations in this era. However, strengthening the security
of an organization's internal network may not be sufficient since modern organizations …

BUCEPHALUS: a BUsiness CEntric cybersecurity Platform for proActive anaLysis Using visual analyticS

M Angelini, G Blasilli, S Bonomi, S Lenti… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Analyzing and mitigating the threats that cyber-attacks pose on the services of a critical
infrastructure is not a trivial activity. Research solutions have been developed using data …

Scoring cyber vulnerabilities based on their impact on organizational goals

O Keskin, N Gannon, B Lopez… - 2021 Systems and …, 2021 - ieeexplore.ieee.org
Vulnerability Management, which is a vital part of risk and resiliency management efforts, is
a continuous process of identifying, classifying, prioritizing, and removing vulnerabilities on …

Cyber-assets at risk (CAR): The cost of personally identifiable information data breaches

OI Poyraz, S Bouazzaoui, O Keskin… - ICCWS 2020 15th …, 2020 - books.google.com
Severe financial consequences of data breaches enforce organizations to reconsider their
cybersecurity investment. Although attack frequency and trends seem similar per industry …

A Novel Approach to Cyber Situational Awareness in Embedded Systems

K Denney, R Lychev, D Kava, A Lee… - 2021 IEEE High …, 2021 - ieeexplore.ieee.org
Impacts from cyberattacks on mission capability of an embedded system and their
mitigations vary according to the system's application and constituents. To effectively …

Cybersecurity acquisition framework based on risk management: Economics perspective

CA Pinto, U Tatar, O Keskin, AC Kucukozyigit… - 2020 - dair.nps.edu
Investments in the cyber domain are subject to constraints that may be similar to those in
other domains, such as cost and effectiveness. However, cyber is a dynamic domain where …

Towards Joint SoS and Threat Mission-based Modeling for Operational Impact Identification

J Sánchez, J Buisson, J El Hachem… - 2024 19th Annual …, 2024 - ieeexplore.ieee.org
Several application domains targeted by systems of systems (SoS), like defense, healthcare,
transportation, are critical domains. So, securing such SoS is mandatory. Even if risk …

Cybersecurity acquisition framework based on risk management: Economics perspective

CA Pinto, OF Keskin, G Kucukkaya, OI Poyraz… - 2021 - dair.nps.edu
Cyber attacks continuously target organizations, however, the mitigation actions taken for
defense are not sufficiently effective. Ability to compute the cost of attacks is crucial to assess …