We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives

    Modern medical devices (MMDs) are a rapidly growing field of medical technology, and recent advances have allowed them to monitor and manage...

    Emmanuel Kwarteng, Mumin Cebe in International Journal of Information Security
    Article 29 March 2024
  2. A method for insider threat assessment by modeling the internal employee interactions

    Insider’s information security threat is one of the most critical issues in organizations. Due to their access to the assets and their knowledge...

    Article 15 April 2023
  3. Analyzing and comparing the security of self-sovereign identity management systems through threat modeling

    The concept of Self-Sovereign Identity (SSI) promises to strengthen the security and user-centricity of identity management. Since any secure online...

    Andreas Grüner, Alexander Mühle, ... Christoph Meinel in International Journal of Information Security
    Article Open access 08 April 2023
  4. Threat Modeling in Cloud Computing - A Literature Review

    Cloud computing has significantly changed the operational models of companies. This adoption has consequently caused impact on security, resulting in...
    Mohammed Kharma, Adel Taweel in Ubiquitous Security
    Conference paper 2023
  5. A descriptive study of assumptions in STRIDE security threat modeling

    Security threat modeling involves the systematic elicitation of plausible threat scenarios, and leads to the identification and articulation of the...

    Dimitri Van Landuyt, Wouter Joosen in Software and Systems Modeling
    Article 17 November 2021
  6. Threat Modeling and Assessment Methods in the Healthcare-IT System: A Critical Review and Systematic Evaluation

    In recent years, the healthcare-IT systems have undergone numerous technological advancements. With the advent of implanted medical devices, the...

    Mohammad Aijaz, Mohammed Nazir, Malik Nadeem Anwar Mohammad in SN Computer Science
    Article 21 September 2023
  7. Threat Modeling of Cyber-Physical Systems in Practice

    Traditional Cyber-physical Systems (CPSs) were not built with cybersecurity in mind. They operated on separate Operational Technology (OT) networks....
    Ameerah-Muhsinah Jamil, Lotfi Ben Othmane, Altaz Valani in Risks and Security of Internet and Systems
    Conference paper 2022
  8. Threat Modeling Towards Resilience in Smart ICUs

    Healthcare digitization has significantly enhanced patient care and alleviated the workload of hospital staff. This trend towards automation has also...
    Christian Baumhör, Thomas Henning, Matteo Große-Kampmann in Secure and Resilient Digital Transformation of Healthcare
    Conference paper 2024
  9. AI-Driven Cybersecurity and Threat Intelligence Cyber Automation, Intelligent Decision-Making and Explainability

    This book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges and threat intelligence as...
    Iqbal H. Sarker
    Book 2024
  10. Introduction to AI-Driven Cybersecurity and Threat Intelligence

    With the convergence of artificial intelligence (AI) and cybersecurity, a new paradigm has emerged in how we defend against evolving digital threats....
    Chapter 2024
  11. Ctam: A Tool for Continuous Threat Analysis and Management

    Security and privacy threat modeling approaches are commonly applied to identify and address design-level security and privacy concerns in the early...
    Laurens Sion, Dimitri Van Landuyt, ... Wouter Joosen in CyberSecurity in a DevOps Environment
    Chapter 2024
  12. Architecting threat hunting system based on the DODAF framework

    The importance of large data analytic systems for cyber security is expanding. Thus, collecting systematically, thoroughly assessing, and...

    Ali Aghamohammadpour, Ebrahim Mahdipour, Iman Attarzadeh in The Journal of Supercomputing
    Article 23 September 2022
  13. Automated Threat Modeling Approaches: Comparison of Open Source Tools

    The software systems of modern architectures are characterized by high heterogeneity and by the use of a model that delegates the control of...
    Daniele Granata, Massimiliano Rak, Giovanni Salzillo in Quality of Information and Communications Technology
    Conference paper 2022
  14. Protection of Computational Machine Learning Models against Extraction Threat

    Abstract

    The extraction threat to machine learning models is considered. Most contemporary methods of defense against the extraction of computational...

    M. O. Kalinin, M. D. Soshnev, A. S. Konoplev in Automatic Control and Computer Sciences
    Article 01 December 2023
  15. Programmable broad learning system for baggage threat recognition

    Detecting illegal and harmful objects in baggage at airports, subways, and bus stations has always been a difficult task that requires intense focus...

    Muhammad Shafay, Abdelfatah Ahmed, ... Naoufel Werghi in Multimedia Tools and Applications
    Article 13 July 2023
  16. Threats and Threat Intelligence

    Digital technologies used in digital transformation are essential for every industrial, public, and private organization. In industry, the automation...
    Chapter 2023
  17. Threat Analysis for Cloud-Native Deployments

    Cloud-native deployments have revolutionized the way organizations build, deploy, and scale applications, offering unprecedented agility and...
    Mohammed Ilyas Ahmed in Cloud-Native DevOps
    Chapter 2024
  18. Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix

    Enterprise systems are growing in complexity, and the adoption of cloud and mobile services has greatly increased the attack surface. To proactively...

    Wenjun **ong, Emeline Legrand, ... Robert Lagerström in Software and Systems Modeling
    Article Open access 18 June 2021
  19. Attribute Repair for Threat Prevention

    We propose a model-based procedure for preventing security threats using formal models. We encode system models and threats as satisfiability modulo...
    Thorsten Tarrach, Masoud Ebrahimi, ... Dejan Ničković in Computer Safety, Reliability, and Security
    Conference paper 2023
  20. An autoML network traffic analyzer for cyber threat detection

    Timely detection and effective treatment of cyber-attacks for protecting personal and sensitive data from unauthorized disclosure constitute a core...

    Alexandros Papanikolaou, Aggelos Alevizopoulos, ... Konstantinos Rantos in International Journal of Information Security
    Article 21 May 2023
Did you find what you were looking for? Share feedback.