MITRE ATT&CK-driven cyber risk assessment
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …
understanding the methods and tactics adversaries use to attack an organisation. The …
GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments
I Kalderemidis, A Farao, P Bountakas… - Proceedings of the 17th …, 2022 - dl.acm.org
Investments on cybersecurity are essential for organizations to protect operational activities,
develop trust relationships with clients, and maintain financial stability. A cybersecurity …
develop trust relationships with clients, and maintain financial stability. A cybersecurity …
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain
Despite the rapid growth of the cyber insurance market in recent years, insurance
companies in this area face several challenges, such as a lack of data, a shortage of …
companies in this area face several challenges, such as a lack of data, a shortage of …
A Bring Your Own Device security awareness survey among professionals
The increasing prevalence of Bring Your Own Device (BYOD) practices in the workplace has
posed significant challenges to organizations in terms of security and management. This …
posed significant challenges to organizations in terms of security and management. This …
P2ISE: preserving project integrity in CI/CD based on secure elements
During the past decade, software development has evolved from a rigid, linear process to a
highly automated and flexible one, thanks to the emergence of continuous integration and …
highly automated and flexible one, thanks to the emergence of continuous integration and …
[HTML][HTML] A trusted platform module-based, pre-emptive and dynamic asset discovery tool
AJ Diaz-Honrubia, AB Herranz, LP Santamaría… - Journal of Information …, 2022 - Elsevier
This paper presents an original Intelligent and Secure Asset Discovery Tool (ISADT) that
uses artificial intelligence and TPM-based technologies to:(i) detect the network assets, and …
uses artificial intelligence and TPM-based technologies to:(i) detect the network assets, and …
Video transaction algorithm considering FISCO alliance chain and improved trusted computing
Y Yang, D Yu, C Yang - PeerJ Computer Science, 2021 - peerj.com
With the advent of the era of self media, the demand for video trading is becoming more and
more obvious. Alliance blockchain has the characteristics of traceable transaction records …
more obvious. Alliance blockchain has the characteristics of traceable transaction records …
Advanced cyber security solutions for critical infrastructure and applications: smart grid and cyber insurance
A Farao - 2024 - dione.lib.unipi.gr
The rapid digitization of critical infrastructure, coupled with the increasing sophistication of
cyber threats, has elevated the importance of robust cybersecurity measures. This …
cyber threats, has elevated the importance of robust cybersecurity measures. This …
Impact of Protection Level on Vertically-Differentiated Two-Sided Software Platforms
MF Hamedani, A Dehghan - International Journal of Information …, 2022 - igi-global.com
This paper studies the impact of software protection level on software platforms and
customers' responses to different levels of protection. This study models the interplay …
customers' responses to different levels of protection. This study models the interplay …
[PDF][PDF] P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements. Information 2021, 12, 357
Over the past decade, software development has evolved from a rigid, linear process to a
highly automated and flexible one, thanks to the emergence of continuous integration and …
highly automated and flexible one, thanks to the emergence of continuous integration and …