Abstract Handling cyber threats unavoidably needs to deal with both uncertain and imprecise information. What we can observe as potential malicious activities can seldom give us 100 % con-fidence on important questions we care about, e.g. what machines are compromised and what damage has been incurred. In security planning, we need information on how likely a vulnerability can lead to a successful compromise to better balance security and functionality, performance, and ease of use. These information are at best qualitative and are often vague and imprecise. In cyber situational awareness, we have to rely on such imperfect information to detect real attacks and to prevent an attack from happening through appropriate risk management. This ch...
ABSTRACT: The rapid developments of technology have provided huge areas of new opportunity and poten...
This electronic version was submitted by the student author. The certified thesis is available in th...
Information and telecommunication infrastructures and services are key constitutive element of our s...
The predictability and understandability of the world around us is limited, and many events are unce...
Cyber-Physical Systems (CPS) are a result of highly cross-disciplinary processes and are evolving to...
The information security (IS) risk assessment process is an essential part to organisation's their p...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...
Due to the rise of Cyber crime it is important to explore the Cyber security area. The threats are r...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
International audienceAbstract— Is risk awareness a factor that influences the risk of IS system usa...
This chapter proposes that the initial perceptions of uncertainty and risk relating to decision maki...
The capability related to cybersecurity plays an ever-growing role on overall national security and ...
A proper assessment of potential cyber threats is vital for security decision-making. This becomes a...
© 2014 Springer Science+Business Media New York. All rights reserved.Chapter Overview: Threat assess...
The dependence on cyberspace has considerably increased over time, as such, people look at risk asso...
ABSTRACT: The rapid developments of technology have provided huge areas of new opportunity and poten...
This electronic version was submitted by the student author. The certified thesis is available in th...
Information and telecommunication infrastructures and services are key constitutive element of our s...
The predictability and understandability of the world around us is limited, and many events are unce...
Cyber-Physical Systems (CPS) are a result of highly cross-disciplinary processes and are evolving to...
The information security (IS) risk assessment process is an essential part to organisation's their p...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...
Due to the rise of Cyber crime it is important to explore the Cyber security area. The threats are r...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
International audienceAbstract— Is risk awareness a factor that influences the risk of IS system usa...
This chapter proposes that the initial perceptions of uncertainty and risk relating to decision maki...
The capability related to cybersecurity plays an ever-growing role on overall national security and ...
A proper assessment of potential cyber threats is vital for security decision-making. This becomes a...
© 2014 Springer Science+Business Media New York. All rights reserved.Chapter Overview: Threat assess...
The dependence on cyberspace has considerably increased over time, as such, people look at risk asso...
ABSTRACT: The rapid developments of technology have provided huge areas of new opportunity and poten...
This electronic version was submitted by the student author. The certified thesis is available in th...
Information and telecommunication infrastructures and services are key constitutive element of our s...