MITRE ATT&CK-driven cyber risk assessment
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …
understanding the methods and tactics adversaries use to attack an organisation. The …
GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments
I Kalderemidis, A Farao, P Bountakas… - Proceedings of the 17th …, 2022 - dl.acm.org
Investments on cybersecurity are essential for organizations to protect operational activities,
develop trust relationships with clients, and maintain financial stability. A cybersecurity …
develop trust relationships with clients, and maintain financial stability. A cybersecurity …
HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles
The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each
other and with road infrastructure on a common network, has promising socio-economic …
other and with road infrastructure on a common network, has promising socio-economic …
AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks
G Petihakis, A Farao, P Bountakas, A Sabazioti… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing integration of Artificial Intelligence (AI) in critical sectors such as healthcare,
finance, and cybersecurity has simultaneously exposed these systems to unique …
finance, and cybersecurity has simultaneously exposed these systems to unique …
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain
Despite the rapid growth of the cyber insurance market in recent years, insurance
companies in this area face several challenges, such as a lack of data, a shortage of …
companies in this area face several challenges, such as a lack of data, a shortage of …
SYNAPSE-An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness …
In an era of escalating cyber threats, the imperative for robust and comprehensive
cybersecurity measures has never been more pressing. To address this challenge …
cybersecurity measures has never been more pressing. To address this challenge …
Privacy impact assessment of cyber attacks on connected and autonomous vehicles
Connected and autonomous vehicles (CAVs) are vulnerable to security gaps that can result
in serious consequences, including cyber-physical and privacy risks. For example, an …
in serious consequences, including cyber-physical and privacy risks. For example, an …
BRIDGE: BRIDGing the gap bEtween CTI production and consumption
M Karatisoglou, A Farao, V Bolgouras… - 2022 14th …, 2022 - ieeexplore.ieee.org
Security for businesses and organizations is essential to protect operational activities, trust
relationship with clients and financial viability. Increased interest for research concerning …
relationship with clients and financial viability. Increased interest for research concerning …
Analyzing coverages of cyber insurance policies using ontology
M Charalambous, A Farao… - Proceedings of the 17th …, 2022 - dl.acm.org
In an era where all the transactions, businesses and services are becoming digital and
online, the data assets and the services protection are of utmost importance. Cyber …
online, the data assets and the services protection are of utmost importance. Cyber …
[PDF][PDF] Optimal strategies for cyber security decision-making
S Panda - 2022 - openresearch.surrey.ac.uk
One of the major concerns of organisations is how to protect themselves from the growing
volume and sophistication of cyber attacks. In this context, methodologies, models, and …
volume and sophistication of cyber attacks. In this context, methodologies, models, and …