AbstractWhen investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge.In this paper, we consider three possible decision support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation, and a hybrid of the two. Our modelling starts by building a framework where we can investigate the effectiveness of a cyber security control regarding the protection of different assets seen as targets in presence of commodity threats. As game theory captures the interaction between the endogenous organisation's and attackers' decisions, we consider a 2-person c...
While there are significant advances in information technology and infrastructure which offer new op...
This paper has proposed a model of the computational core for the decision support system (DSS) when...
This paper has proposed a model of the computational core for the decision support system (DSS) when...
When investing in cyber security resources, information security managers have to follow effective d...
Creative Commons License: Attribution 4When investing in cyber security resources, information secur...
AbstractWhen investing in cyber security resources, information security managers have to follow eff...
Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are pa...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
In the information age, the scale and scope of cyber attacks on information systems is on the rise. ...
A decision support system for cyber-security is here presented. The system aims to select an optimal...
Investments on cybersecurity are essential for organizations to protect operational activities, deve...
Nowadays, cyber threats are considered among the most dangerous risks by top management of enterpris...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
While there are significant advances in information technology and infrastructure which offer new op...
This paper has proposed a model of the computational core for the decision support system (DSS) when...
This paper has proposed a model of the computational core for the decision support system (DSS) when...
When investing in cyber security resources, information security managers have to follow effective d...
Creative Commons License: Attribution 4When investing in cyber security resources, information secur...
AbstractWhen investing in cyber security resources, information security managers have to follow eff...
Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are pa...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
In the information age, the scale and scope of cyber attacks on information systems is on the rise. ...
A decision support system for cyber-security is here presented. The system aims to select an optimal...
Investments on cybersecurity are essential for organizations to protect operational activities, deve...
Nowadays, cyber threats are considered among the most dangerous risks by top management of enterpris...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
While there are significant advances in information technology and infrastructure which offer new op...
This paper has proposed a model of the computational core for the decision support system (DSS) when...
This paper has proposed a model of the computational core for the decision support system (DSS) when...