Results 121 to 130 of about 74,403 (290)
In the face of escalating cyber threats to critical infrastructures, achieving robust cyber resilience has become paramount. This paper proposes an endogenous security-oriented framework for cyber resilience assessment, specifically tailored for critical
Mingyu Luo +4 more
doaj +1 more source
ABSTRACT System of Systems (SoS) environments are inherently complex, involving numerous operationally and managerially independent component systems with hidden interdependencies and frequent interactions based on unstructured data. In this paper, we propose using graphical Retrieval‐Augmented Generation (GraphRAG), a tool that combines large language
Yinchien Huang +2 more
wiley +1 more source
Cyber dating abuse is a significant issue among emerging adults, with harmful implications for both victims and perpetrators. This study had two main objectives: first, to validate previous findings regarding the association between victimization and ...
Beatriz Víllora +3 more
doaj +1 more source
Mission Aware Cyber‐Physical Security
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis +3 more
wiley +1 more source
Banking on resilience: 20 years of cybersecurity evolution
Background: The rise in cyberattacks, particularly targeting financial institutions, poses significant risks. A shift towards cyber threat resilience, emphasising proactive strategies for recovery and adaptation, is essential.
Ntokozo F. Miya, Nazeer Joseph
doaj +1 more source
A Systems Engineering Methodology for System of Autonomous Systems: Test and Evaluation
ABSTRACT Recent advances in artificial intelligence and machine learning (AI/ML) have resulted in autonomous systems that reduce operators' workload and involvement in hazardous missions. Integrating these systems into an existing system of systems (SoS) can evolve it into a system of autonomous system (SoAS).
Mohammadreza Torkjazi, Ali K. Raz
wiley +1 more source
Safety Science as a Source of Organizational Cyber Resilience in Incident Response
This paper presents a scoping review of how safety science is being applied in Incident Response (IR) to improve organisational cyber resilience.
Haula Sani Galadima +3 more
doaj +1 more source
Towards a Layered Architectural View for Security Analysis in SCADA Systems
Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of
Ma, Zhendong +2 more
core
Assessing Capability Complexity Using Enterprise Architecture Framework
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley +1 more source
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source

