Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also instantiated by the growth of BN models development in cyber security. However, a comprehensive comparison and analysis of these models is missing. In this paper, we conduct a systematic review of the scientific literature and identify 17 standard BN models in cyber security. We analyse these models based on 9 different criteria and identify important patterns in the use of these models. A key outcome is that standard BNs are noticeably used for problems especially associated with malicious insiders. This study points out the core range of problems that were tackled using sta...
The challenge of cyberattack detection can be illustrated by the complexity of the MITRE ATT&CKTM ma...
Contains fulltext : 237105.pdf (Publisher’s version ) (Open Access)Water managemen...
Cybersecurity threats have surged in the past decades. Experts agree that conventional security meas...
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially...
Capturing the uncertain aspects in cyber security is important for security analysis in enterprise n...
Water management infrastructures such as floodgates are critical and increasingly operated by Indust...
Water management infrastructures such as floodgates are critical and increasingly operated by Indust...
Water management infrastructures such as floodgates are critical and increasingly operated by Indust...
Abstract: Computer Network Security has become a critical and important issue due to ever increasing...
<span lang="MS">Malware can be defined as malicious software that infiltrates a network and computer...
Abstract—This paper introduces a Bayesian network model for the motivation and psychology of the mal...
The significant recent growth in digitization has been accompanied by a rapid increase in cyber atta...
Cyber security is an important issue in the field of nuclear engineering because nuclear facilities ...
This research addressed one of the hard problems still plaguing the information security profession;...
This research addressed one of the hard problems still plaguing the information security profession;...
The challenge of cyberattack detection can be illustrated by the complexity of the MITRE ATT&CKTM ma...
Contains fulltext : 237105.pdf (Publisher’s version ) (Open Access)Water managemen...
Cybersecurity threats have surged in the past decades. Experts agree that conventional security meas...
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially...
Capturing the uncertain aspects in cyber security is important for security analysis in enterprise n...
Water management infrastructures such as floodgates are critical and increasingly operated by Indust...
Water management infrastructures such as floodgates are critical and increasingly operated by Indust...
Water management infrastructures such as floodgates are critical and increasingly operated by Indust...
Abstract: Computer Network Security has become a critical and important issue due to ever increasing...
<span lang="MS">Malware can be defined as malicious software that infiltrates a network and computer...
Abstract—This paper introduces a Bayesian network model for the motivation and psychology of the mal...
The significant recent growth in digitization has been accompanied by a rapid increase in cyber atta...
Cyber security is an important issue in the field of nuclear engineering because nuclear facilities ...
This research addressed one of the hard problems still plaguing the information security profession;...
This research addressed one of the hard problems still plaguing the information security profession;...
The challenge of cyberattack detection can be illustrated by the complexity of the MITRE ATT&CKTM ma...
Contains fulltext : 237105.pdf (Publisher’s version ) (Open Access)Water managemen...
Cybersecurity threats have surged in the past decades. Experts agree that conventional security meas...