The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent 2014
DOI: 10.1109/cyber.2014.6917483
|View full text |Cite
|
Sign up to set email alerts
|

A qualitative analysis of an ontology based issue resolution system for cyber attack management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 11 publications
0
12
0
Order By: Relevance
“…Focus on single issue encountered by AMS [17], [23]- [25], [25]- [29] ✓ Detailed architecture of conventional AMS X ✓…”
Section: Features Previous Work This Papermentioning
confidence: 99%
See 1 more Smart Citation
“…Focus on single issue encountered by AMS [17], [23]- [25], [25]- [29] ✓ Detailed architecture of conventional AMS X ✓…”
Section: Features Previous Work This Papermentioning
confidence: 99%
“…Earlier researchers have emphasized the importance of understanding Threat vectors and proposed attack taxonomies. The authors in [23] proposed a taxonomy of Threat vectors in terms of five classifiers to illustrate the category of an attack using attack vector, defense, operational influence, informational repercussion, and by attack target. Ivaturi and Janczewski [52] also considered increasing Threat vectors as a threat to malware analysis and proposed a taxonomy for social engineering attacks as attackers are using social engineering methods by aiming at the human elements and merging such techniques with conventional technical methods.…”
Section: A Increasing Threat Vectorsmentioning
confidence: 99%
“…The authentication function is critical to ensuring the security and privacy of IoT devices. The new authentication systems cannot be tested in precise detail (26). It is possible to utilize these programs to download malicious payloads that may be used to spy on a computer, for example, when they are installed.…”
Section: Ecs Transactions 107 (1) 15043-15052 (2022)mentioning
confidence: 99%
“…Unauthorized disclosures include the unauthorized access or misuse of information and the stripping away of the confidentiality of personal data (Bertot et al, 2012; Layne & Lee, 2001; Picazo-Vela et al, 2012; Zavattaro & Sementelli, 2014). Disruptive cyberattacks, as outlined by Simmons et al (2014), refer to any insertion of malware that disrupts the agency activities, including ransoms or breaches (Bertot et al, 2012). We analyze variation in reports of unauthorized disclosures and disruptive cyberattacks as related to social aspects (e.g., managerial perceptions of social media and open data initiatives) and technology capacity (e.g., social media use, open data efforts, and ICT use for collaborative work purposes).…”
Section: Introductionmentioning
confidence: 99%