A reference model of information assurance & security
Y Cherdantseva, J Hilton - 2013 international conference on …, 2013 - ieeexplore.ieee.org
Information Assurance & Security (IAS) is a dynamic domain which changes continuously in
response to the evolution of society, business needs and technology. This paper proposes a …
response to the evolution of society, business needs and technology. This paper proposes a …
[HTML][HTML] Trustworthy AI: Securing sensitive data in large language models
G Feretzakis, VS Verykios - AI, 2024 - mdpi.com
Large language models (LLMs) have transformed Natural Language Processing (NLP) by
enabling robust text generation and understanding. However, their deployment in sensitive …
enabling robust text generation and understanding. However, their deployment in sensitive …
Ids using machine learning-current state of art and future directions
Y Hamid, M Sugumaran… - British Journal of …, 2016 - science.scholarsacademic.com
The prosperity of technology worldwide has made the concerns of security tend to increase
rapidly. The enormous usage of Internetworking has raised the need of protecting systems …
rapidly. The enormous usage of Internetworking has raised the need of protecting systems …
[HTML][HTML] Cyber-risk decision models: To insure IT or not?
Security breaches adversely impact profit margins, market capitalization and brand image of
an organization. Global organizations resort to the use of technological devices to reduce …
an organization. Global organizations resort to the use of technological devices to reduce …
[HTML][HTML] A taxonomy for privacy enhancing technologies
J Heurix, P Zimmermann, T Neubauer, S Fenz - Computers & Security, 2015 - Elsevier
Privacy-enhancing technologies (PETs) belong to a class of technical measures which aim
at preserving the privacy of individuals or groups of individuals. Numerous PETs have been …
at preserving the privacy of individuals or groups of individuals. Numerous PETs have been …
Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things
Internet of Things (IoT) brings the third development wave of the global information industry,
which makes users, network, and perception devices cooperate more closely. However, if …
which makes users, network, and perception devices cooperate more closely. However, if …
An ontology of information security
A Herzog, N Shahmehri, C Duma - International Journal of …, 2007 - igi-global.com
We present a publicly available, OWL-based ontology of information security which models
assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be …
assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be …
[HTML][HTML] Evaluation model for knowledge sharing in information security professional virtual community
Abstract Knowledge sharing has been proven to have affirmative effects on both the
education and business sectors. Nevertheless, many professional virtual communities (PVC) …
education and business sectors. Nevertheless, many professional virtual communities (PVC) …
Investigating brute force attack patterns in IoT network
Internet of Things (IoT) devices may transfer data to the gateway/application server through
File Transfer Protocol (FTP) transaction. Unfortunately, in terms of security, the FTP server at …
File Transfer Protocol (FTP) transaction. Unfortunately, in terms of security, the FTP server at …
[HTML][HTML] Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method
Employees' poor compliance with information security policies is a perennial problem.
Current information security analysis methods do not allow information security managers to …
Current information security analysis methods do not allow information security managers to …