MITRE ATT&CK-driven cyber risk assessment

M Ahmed, S Panda, C Xenakis… - Proceedings of the 17th …, 2022 - dl.acm.org
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …

GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments

I Kalderemidis, A Farao, P Bountakas… - Proceedings of the 17th …, 2022 - dl.acm.org
Investments on cybersecurity are essential for organizations to protect operational activities,
develop trust relationships with clients, and maintain financial stability. A cybersecurity …

INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain

A Farao, G Paparis, S Panda, E Panaousis… - International Journal of …, 2024 - Springer
Despite the rapid growth of the cyber insurance market in recent years, insurance
companies in this area face several challenges, such as a lack of data, a shortage of …

A Bring Your Own Device security awareness survey among professionals

G Petihakis, D Kiritsis, A Farao, P Bountakas… - Proceedings of the 18th …, 2023 - dl.acm.org
The increasing prevalence of Bring Your Own Device (BYOD) practices in the workplace has
posed significant challenges to organizations in terms of security and management. This …

P2ISE: preserving project integrity in CI/CD based on secure elements

A Muñoz, A Farao, JRC Correia, C Xenakis - Information, 2021 - mdpi.com
During the past decade, software development has evolved from a rigid, linear process to a
highly automated and flexible one, thanks to the emergence of continuous integration and …

[HTML][HTML] A trusted platform module-based, pre-emptive and dynamic asset discovery tool

AJ Diaz-Honrubia, AB Herranz, LP Santamaría… - Journal of Information …, 2022 - Elsevier
This paper presents an original Intelligent and Secure Asset Discovery Tool (ISADT) that
uses artificial intelligence and TPM-based technologies to:(i) detect the network assets, and …

Video transaction algorithm considering FISCO alliance chain and improved trusted computing

Y Yang, D Yu, C Yang - PeerJ Computer Science, 2021 - peerj.com
With the advent of the era of self media, the demand for video trading is becoming more and
more obvious. Alliance blockchain has the characteristics of traceable transaction records …

Advanced cyber security solutions for critical infrastructure and applications: smart grid and cyber insurance

A Farao - 2024 - dione.lib.unipi.gr
The rapid digitization of critical infrastructure, coupled with the increasing sophistication of
cyber threats, has elevated the importance of robust cybersecurity measures. This …

Impact of Protection Level on Vertically-Differentiated Two-Sided Software Platforms

MF Hamedani, A Dehghan - International Journal of Information …, 2022 - igi-global.com
This paper studies the impact of software protection level on software platforms and
customers' responses to different levels of protection. This study models the interplay …

[PDF][PDF] P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements. Information 2021, 12, 357

A Muñoz, A Farao, JRC Correia, C Xenakis - 2021 - academia.edu
Over the past decade, software development has evolved from a rigid, linear process to a
highly automated and flexible one, thanks to the emergence of continuous integration and …