Mass customized/personalized manufacturing in Industry 4.0 and blockchain: Research challenges, main problems, and the design of an information architecture
Mass customized and mass personalized production has become facilitated by the fourth
industrial revolution. The resulting industrial environments require the development of …
industrial revolution. The resulting industrial environments require the development of …
[PDF][PDF] Simulation for cybersecurity: state of the art and future directions
H Kavak, JJ Padilla, D Vernon-Bido… - Journal of …, 2021 - academic.oup.com
In this article, we provide an introduction to simulation for cybersecurity and focus on three
themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …
themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …
Cyber third-party risk management: A comparison of non-intrusive risk scoring reports
Cybersecurity is a concern for organizations in this era. However, strengthening the security
of an organization's internal network may not be sufficient since modern organizations …
of an organization's internal network may not be sufficient since modern organizations …
BUCEPHALUS: a BUsiness CEntric cybersecurity Platform for proActive anaLysis Using visual analyticS
Analyzing and mitigating the threats that cyber-attacks pose on the services of a critical
infrastructure is not a trivial activity. Research solutions have been developed using data …
infrastructure is not a trivial activity. Research solutions have been developed using data …
Scoring cyber vulnerabilities based on their impact on organizational goals
O Keskin, N Gannon, B Lopez… - 2021 Systems and …, 2021 - ieeexplore.ieee.org
Vulnerability Management, which is a vital part of risk and resiliency management efforts, is
a continuous process of identifying, classifying, prioritizing, and removing vulnerabilities on …
a continuous process of identifying, classifying, prioritizing, and removing vulnerabilities on …
Cyber-assets at risk (CAR): The cost of personally identifiable information data breaches
Severe financial consequences of data breaches enforce organizations to reconsider their
cybersecurity investment. Although attack frequency and trends seem similar per industry …
cybersecurity investment. Although attack frequency and trends seem similar per industry …
A Novel Approach to Cyber Situational Awareness in Embedded Systems
K Denney, R Lychev, D Kava, A Lee… - 2021 IEEE High …, 2021 - ieeexplore.ieee.org
Impacts from cyberattacks on mission capability of an embedded system and their
mitigations vary according to the system's application and constituents. To effectively …
mitigations vary according to the system's application and constituents. To effectively …
Cybersecurity acquisition framework based on risk management: Economics perspective
Investments in the cyber domain are subject to constraints that may be similar to those in
other domains, such as cost and effectiveness. However, cyber is a dynamic domain where …
other domains, such as cost and effectiveness. However, cyber is a dynamic domain where …
Towards Joint SoS and Threat Mission-based Modeling for Operational Impact Identification
J Sánchez, J Buisson, J El Hachem… - 2024 19th Annual …, 2024 - ieeexplore.ieee.org
Several application domains targeted by systems of systems (SoS), like defense, healthcare,
transportation, are critical domains. So, securing such SoS is mandatory. Even if risk …
transportation, are critical domains. So, securing such SoS is mandatory. Even if risk …
Cybersecurity acquisition framework based on risk management: Economics perspective
Cyber attacks continuously target organizations, however, the mitigation actions taken for
defense are not sufficiently effective. Ability to compute the cost of attacks is crucial to assess …
defense are not sufficiently effective. Ability to compute the cost of attacks is crucial to assess …