2017
DOI: 10.1088/1742-6596/892/1/012011
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…The review methodology is consistent with the work conducted by [45]. Therefore, prior studies that showed systematic review or systematic mapping approaches are applied with minor differences [51][52][53][54][55][56][57]; however, there are overlapping phases or processes, such as the identification of studies, selection, quality assessment, data extraction, and data synthesis [51,52,[58][59][60][61][62][63][64]. For example, reference [54] splits the selection phase into the development of inclusion or exclusion criteria and selected studies for inclusion and exclusion criteria.…”
Section: Methodsmentioning
confidence: 99%
“…The review methodology is consistent with the work conducted by [45]. Therefore, prior studies that showed systematic review or systematic mapping approaches are applied with minor differences [51][52][53][54][55][56][57]; however, there are overlapping phases or processes, such as the identification of studies, selection, quality assessment, data extraction, and data synthesis [51,52,[58][59][60][61][62][63][64]. For example, reference [54] splits the selection phase into the development of inclusion or exclusion criteria and selected studies for inclusion and exclusion criteria.…”
Section: Methodsmentioning
confidence: 99%
“…Our previous works on threat factor profiling [3], [4] has been focusing on the sources integration, fuzzifying the threat severity, computing asset (ATL) and organisational (OTL) based threat level and developing model to predict the ATL and OTL. Presentation and visualization of the results are in multiple granularities such as hourly, daily, weekly, and so on.…”
Section: Network Threats Severity Predictionmentioning
confidence: 99%
“…Our previous and similar efforts [3]- [7] were tested data within different time series from the ones highlighted in this work. This paper is also distinguished by addressing the temporal trend analysis pattern mining.…”
Section: Introductionmentioning
confidence: 99%
“…[9], [10] Degree of RA is determined by probability and impact [11] and its status is separated into 5 degrees (higher, high, middle, low and lower). [12] There are several RA standards, that is ISO/IEC TR 13335:1998, AS/NZS 4360:2004, [13]BSI standard 100-3:2005, FAIR, ISACA, COBIT 5, ISF IRAM, ISO/IEC 3100:2009 and 27005:2011 [14], MAGERIT, NIST special publication 800-30, OCTAVE Allegro and risk safety, etc. and framework, the RA, is ISO 270002 standard, COBIT, NIST SP800-53, etc.…”
Section: Introductionmentioning
confidence: 99%