Search
Search Results
-
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives
Modern medical devices (MMDs) are a rapidly growing field of medical technology, and recent advances have allowed them to monitor and manage...
-
A method for insider threat assessment by modeling the internal employee interactions
Insider’s information security threat is one of the most critical issues in organizations. Due to their access to the assets and their knowledge...
-
Analyzing and comparing the security of self-sovereign identity management systems through threat modeling
The concept of Self-Sovereign Identity (SSI) promises to strengthen the security and user-centricity of identity management. Since any secure online...
-
Threat Modeling in Cloud Computing - A Literature Review
Cloud computing has significantly changed the operational models of companies. This adoption has consequently caused impact on security, resulting in... -
A descriptive study of assumptions in STRIDE security threat modeling
Security threat modeling involves the systematic elicitation of plausible threat scenarios, and leads to the identification and articulation of the...
-
Threat Modeling and Assessment Methods in the Healthcare-IT System: A Critical Review and Systematic Evaluation
In recent years, the healthcare-IT systems have undergone numerous technological advancements. With the advent of implanted medical devices, the...
-
Threat Modeling of Cyber-Physical Systems in Practice
Traditional Cyber-physical Systems (CPSs) were not built with cybersecurity in mind. They operated on separate Operational Technology (OT) networks.... -
Threat Modeling Towards Resilience in Smart ICUs
Healthcare digitization has significantly enhanced patient care and alleviated the workload of hospital staff. This trend towards automation has also... -
AI-Driven Cybersecurity and Threat Intelligence Cyber Automation, Intelligent Decision-Making and Explainability
This book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges and threat intelligence as... -
Introduction to AI-Driven Cybersecurity and Threat Intelligence
With the convergence of artificial intelligence (AI) and cybersecurity, a new paradigm has emerged in how we defend against evolving digital threats.... -
Ctam: A Tool for Continuous Threat Analysis and Management
Security and privacy threat modeling approaches are commonly applied to identify and address design-level security and privacy concerns in the early... -
Architecting threat hunting system based on the DODAF framework
The importance of large data analytic systems for cyber security is expanding. Thus, collecting systematically, thoroughly assessing, and...
-
Automated Threat Modeling Approaches: Comparison of Open Source Tools
The software systems of modern architectures are characterized by high heterogeneity and by the use of a model that delegates the control of... -
Protection of Computational Machine Learning Models against Extraction Threat
AbstractThe extraction threat to machine learning models is considered. Most contemporary methods of defense against the extraction of computational...
-
Programmable broad learning system for baggage threat recognition
Detecting illegal and harmful objects in baggage at airports, subways, and bus stations has always been a difficult task that requires intense focus...
-
Threats and Threat Intelligence
Digital technologies used in digital transformation are essential for every industrial, public, and private organization. In industry, the automation... -
Threat Analysis for Cloud-Native Deployments
Cloud-native deployments have revolutionized the way organizations build, deploy, and scale applications, offering unprecedented agility and... -
Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix
Enterprise systems are growing in complexity, and the adoption of cloud and mobile services has greatly increased the attack surface. To proactively...
-
Attribute Repair for Threat Prevention
We propose a model-based procedure for preventing security threats using formal models. We encode system models and threats as satisfiability modulo... -
An autoML network traffic analyzer for cyber threat detection
Timely detection and effective treatment of cyber-attacks for protecting personal and sensitive data from unauthorized disclosure constitute a core...