2020
DOI: 10.1016/j.promfg.2020.02.243
|View full text |Cite
|
Sign up to set email alerts
|

Risk based approach in scope of cybersecurity threats and requirements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…-due to their intuitively attractive topology, the results of classification models are easy to understand [6,13,14].…”
Section: Fig 1 Algorithm For Implementing the Evaluation Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…-due to their intuitively attractive topology, the results of classification models are easy to understand [6,13,14].…”
Section: Fig 1 Algorithm For Implementing the Evaluation Methodsmentioning
confidence: 99%
“…The paper [14] proposes the risk management process for detecting, analyzing, evaluating, responding to cyber threats and monitoring risks at each stage of the cybersecurity chain. This approach can be used in organizations that intend to implement security mechanisms to align them with current requirements or reduce cyber risks to an accepted level.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…Ben et al [3] used a quantitative approach to evaluate the motivation, capabilities and opportunity of attackers to calculate the risk associated with specific threats. While [15] and [8] proposed a threat-centric approach for risk management based on the cyber kill chain. Figueira et al [8], in particular, used machine learning to identify the frequency of threat occurrence.…”
Section: Related Workmentioning
confidence: 99%
“…Information and communications technology (ICT) has created limitless business opportunities and has become inseparable from organisations. Besides its numerous benefits, ICT has drawbacks, i.e., cybersecurity threats, vulnerability, and a lack of effective control over administrative access that cybercriminals can exploit [2].…”
Section: Introductionmentioning
confidence: 99%