A Systematic Mapping Study of the Advancement in Software Vulnerability Forecasting
A Gautier, C Whitehead, D Dzielski… - SoutheastCon …, 2023 - ieeexplore.ieee.org
Developing software securely remains a challenge even with great advancements made in
AI, vulnerability databases, dynamic and static code analysis. Research into aspects of …
AI, vulnerability databases, dynamic and static code analysis. Research into aspects of …
A Review on Information Security Risk Assessment of Smart Systems: Risk Landscape, Challenges, and Prospective Methods
R Fauzi, J Sembiring - … 10th International Conference on ICT for …, 2023 - ieeexplore.ieee.org
The development of Smart Systems has been followed by the emergence of security risks
associated with cyber and artificial intelligence. Besides being the most significant source of …
associated with cyber and artificial intelligence. Besides being the most significant source of …
A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors
Cyber-attacks targeting high-profile entities are focused, persistent, and employ common
vectors with varying levels of sophistication to exploit social-technical vulnerabilities …
vectors with varying levels of sophistication to exploit social-technical vulnerabilities …
[PDF][PDF] Towards Reducing the Impact of Data Breaches
GOM Yee - … on Emerging Security Information, Systems and …, 2020 - personales.upv.es
Organizations are increasingly being victimized by breaches of private data, resulting in
heavy losses to both the organizations and the owners of the data, ie, the people described …
heavy losses to both the organizations and the owners of the data, ie, the people described …
AO2DS: A Method of Auxiliary Operational Decision-making Based on System Dynamics Simulation
Z Ren, X Ren, L Ren - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
The intelligent decision plays an important role in the modern war. This paper proposes
AO2DS, an auxiliary operational decision method based on system dynamics simulation, to …
AO2DS, an auxiliary operational decision method based on system dynamics simulation, to …
[PDF][PDF] Attack Surface Reduction to Minimize Private Data Loss from Breaches
GOM Yee - personales.upv.es
Organizations are increasingly being victimized by breaches of private data, resulting in
heavy losses to both the organizations and the owners of the data. For organizations, these …
heavy losses to both the organizations and the owners of the data. For organizations, these …