Including insider threats into risk management through Bayesian threat graph networks (English)
- New search for: d'Ambrosio, Nicola
- Further information on d'Ambrosio, Nicola:
- https://orcid.org/0000-0001-8430-9061
- New search for: Perrone, Gaetano
- Further information on Perrone, Gaetano:
- https://orcid.org/0000-0001-8238-6426
- New search for: Romano, Simon Pietro
- Further information on Romano, Simon Pietro:
- https://orcid.org/0000-0002-5876-0382
- New search for: d'Ambrosio, Nicola
- Further information on d'Ambrosio, Nicola:
- https://orcid.org/0000-0001-8430-9061
- New search for: Perrone, Gaetano
- Further information on Perrone, Gaetano:
- https://orcid.org/0000-0001-8238-6426
- New search for: Romano, Simon Pietro
- Further information on Romano, Simon Pietro:
- https://orcid.org/0000-0002-5876-0382
In:
Computers and Security
;
133
;
2023
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Including insider threats into risk management through Bayesian threat graph networks
-
Contributors:
-
Published in:Computers and Security ; 133
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2023-07-24
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 133
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
XMal: A lightweight memory-based explainable obfuscated-malware detectorAlani, Mohammed M. / Mashatan, Atefeh / Miri, Ali et al. | 2023
-
Should i really do that? Using quantile regression to examine the impact of sanctions on information security policy compliance behaviorHengstler, Sebastian / Kuehnel, Stephan / Masuch, Kristin / Nastjuk, Ilja / Trang, Simon et al. | 2023
-
Empirically evaluating the effect of security precautions on cyber incidentsGandal, Neil / Moore, Tyler / Riordan, Michael / Barnir, Noa et al. | 2023
-
Including insider threats into risk management through Bayesian threat graph networksd'Ambrosio, Nicola / Perrone, Gaetano / Romano, Simon Pietro et al. | 2023
-
Attack scenario reconstruction via fusing heterogeneous threat intelligenceZang, Xiaodong / Gong, Jian / Zhang, Xinchang / Li, Guiqing et al. | 2023
-
Editorial Board| 2023
-
Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor surveyAkiyama, Mitsuaki / Shiraishi, Shugo / Fukumoto, Akifumi / Yoshimoto, Ryota / Shioji, Eitaro / Yamauchi, Toshihiro et al. | 2023
-
Protection, expertise and domination: Cyber masculinity in practiceDa Silva, Joseph et al. | 2023
-
Zero trust cybersecurity: Critical success factors and A maturity assessment frameworkYeoh, William / Liu, Marina / Shore, Malcolm / Jiang, Frank et al. | 2023
-
Forensic investigation framework for cryptocurrency wallet in the end devicePark, Ah-hyun / Ryu, Hyejin / Park, Woobeen / Jeong, Doowon et al. | 2023
-
Federated learning for reliable model updates in network-based intrusion detectiondos Santos, Roger R. / Viegas, Eduardo K. / Santin, Altair O. / Tedeschi, Pietro et al. | 2023
-
Forecasting cyber security threats landscape and associated technical trends in telehealth using Bidirectional Encoder Representations from Transformers (BERT)Govindarajan, Usharani Hareesh / Singh, Dhiraj Kumar / Gohel, Hardik A. et al. | 2023
-
Basic secure services for standard RISC-V architecturesBove, Davide / Funk, Julian et al. | 2023
-
EBDM: Ensemble binary detection models for multi-class wireless intrusion detection based on deep neural networkTseng, Chinyang Henry / Chang, Ya-Ting et al. | 2023
-
Employees' in-role and extra-role information security behaviors from the P-E fit perspectiveYin, Ya / Hsu, Carol / Zhou, Zhongyun et al. | 2023
-
STRIDE threat model-based framework for assessing the vulnerabilities of modern vehiclesAbuabed, Zaina / Alsadeh, Ahmad / Taweel, Adel et al. | 2023
-
A comprehensive dual-layer architecture for phishing and spam email detectionDoshi, Jay / Parmar, Kunal / Sanghavi, Raj / Shekokar, Narendra et al. | 2023
-
A new deep boosted CNN and ensemble learning based IoT malware detectionKhan, Saddam Hussain / Alahmadi, Tahani Jaser / Ullah, Wasi / Iqbal, Javed / Rahim, Azizur / Alkahtani, Hend Khalid / Alghamdi, Wajdi / Almagrabi, Alaa Omran et al. | 2023
-
IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliancesAhn, Na Young / Lee, Dong Hoon et al. | 2023
-
Thwarting code-reuse and side-channel attacks in embedded systemsTsoupidi, Rodothea Myrsini / Troubitsyna, Elena / Papadimitratos, Panagiotis et al. | 2023
-
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learningMa, Hua / Li, Qun / Zheng, Yifeng / Zhang, Zhi / Liu, Xiaoning / Gao, Yansong / Al-Sarawi, Said F. / Abbott, Derek et al. | 2023
-
A systematic literature review on wireless security testbeds in the cyber-physical realmKampourakis, Vyron / Gkioulos, Vasileios / Katsikas, Sokratis et al. | 2023
-
Detecting malicious reviews and users affecting social reviewing systems: A surveyEsposito, Christian / Moscato, Vincenzo / Sperlì, Giancarlo et al. | 2023
-
Improving adversarial robustness through a curriculum-guided reliable distillationLi, Jiawen / Fang, Kun / Huang, Xiaolin / Yang, Jie et al. | 2023
-
SCFL: Mitigating backdoor attacks in federated learning based on SVD and clusteringWang, Yongkang / Zhai, Di-Hua / Xia, Yuanqing et al. | 2023
-
Towards a robust, effective and resource efficient machine learning technique for IoT security monitoringZakariyya, Idris / Kalutarage, Harsha / Al-Kadri, M. Omar et al. | 2023