A reference model of information assurance & security

Y Cherdantseva, J Hilton - 2013 international conference on …, 2013 - ieeexplore.ieee.org
Information Assurance & Security (IAS) is a dynamic domain which changes continuously in
response to the evolution of society, business needs and technology. This paper proposes a …

[HTML][HTML] Trustworthy AI: Securing sensitive data in large language models

G Feretzakis, VS Verykios - AI, 2024 - mdpi.com
Large language models (LLMs) have transformed Natural Language Processing (NLP) by
enabling robust text generation and understanding. However, their deployment in sensitive …

Ids using machine learning-current state of art and future directions

Y Hamid, M Sugumaran… - British Journal of …, 2016 - science.scholarsacademic.com
The prosperity of technology worldwide has made the concerns of security tend to increase
rapidly. The enormous usage of Internetworking has raised the need of protecting systems …

[HTML][HTML] Cyber-risk decision models: To insure IT or not?

A Mukhopadhyay, S Chatterjee, D Saha… - Decision Support …, 2013 - Elsevier
Security breaches adversely impact profit margins, market capitalization and brand image of
an organization. Global organizations resort to the use of technological devices to reduce …

[HTML][HTML] A taxonomy for privacy enhancing technologies

J Heurix, P Zimmermann, T Neubauer, S Fenz - Computers & Security, 2015 - Elsevier
Privacy-enhancing technologies (PETs) belong to a class of technical measures which aim
at preserving the privacy of individuals or groups of individuals. Numerous PETs have been …

Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things

G Xu, Y Cao, Y Ren, X Li, Z Feng - IEEE Access, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) brings the third development wave of the global information industry,
which makes users, network, and perception devices cooperate more closely. However, if …

An ontology of information security

A Herzog, N Shahmehri, C Duma - International Journal of …, 2007 - igi-global.com
We present a publicly available, OWL-based ontology of information security which models
assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be …

[HTML][HTML] Evaluation model for knowledge sharing in information security professional virtual community

A Tamjidyamcholo, MSB Baba, NLM Shuib… - Computers & …, 2014 - Elsevier
Abstract Knowledge sharing has been proven to have affirmative effects on both the
education and business sectors. Nevertheless, many professional virtual communities (PVC) …

Investigating brute force attack patterns in IoT network

D Stiawan, MY Idris, RF Malik… - Journal of Electrical …, 2019 - Wiley Online Library
Internet of Things (IoT) devices may transfer data to the gateway/application server through
File Transfer Protocol (FTP) transaction. Unfortunately, in terms of security, the FTP server at …

[HTML][HTML] Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method

E Kolkowska, F Karlsson, K Hedström - The Journal of Strategic Information …, 2017 - Elsevier
Employees' poor compliance with information security policies is a perennial problem.
Current information security analysis methods do not allow information security managers to …