Due to the rise of Cyber crime it is important to explore the Cyber security area. The threats are real and can cause severe damage to both the system and its clients. Many examples can be given; one of them is BitBucket which encountered a denial of service attack (based on Amazon Cloud infrastructure) and led to 19 hours outage [6]. Bearing in mind the importance of the Cyber security and the factors that play a major role, the human factor was recognized as one of the most important.<p></p> For this reason, this paper focuses on the application of safety techniques to the Cyber domain. More specifically it investigates the possibility of a successful implementation of the Situation Awareness theory into a Networking Enviro...
Abstract Handling cyber threats unavoidably needs to deal with both uncertain and imprecise informat...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
As one of the security components in cyber situational awareness systems, Intrusion Detection Syste...
his paper presents an empirical framework for implementing Situation Awareness Measurement Technique...
Although there are many well-established cyber security tools and techniques available to network ad...
This paper illustrates how Situation Awareness measurement techniques can be transferred and adopted...
Human reliance on interconnected devices has given rise to a massive increase in cyber activities. T...
Cyber-attacks have been an increasing threat on people and organisations, which led to massive unple...
Part 6: Ph.D. Track: Methods for the Protection of Infrastructure and ServicesInternational audience...
Ensuring cost-efficient cybersecurity for a networked system is a challenging task. In this task, cy...
The capability related to cybersecurity plays an ever-growing role on overall national security and ...
Cybersecurity and risk management are an inevitable part of organisations decision-making processes....
Abstract. Networked software systems have a remarkable and critical role in the modern society. Ther...
Cyber situation awareness has been recognized as a vital requirement for effective cyber defense. Cy...
The paper discusses the crucial role played by adequate situational awareness in the protection of m...
Abstract Handling cyber threats unavoidably needs to deal with both uncertain and imprecise informat...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
As one of the security components in cyber situational awareness systems, Intrusion Detection Syste...
his paper presents an empirical framework for implementing Situation Awareness Measurement Technique...
Although there are many well-established cyber security tools and techniques available to network ad...
This paper illustrates how Situation Awareness measurement techniques can be transferred and adopted...
Human reliance on interconnected devices has given rise to a massive increase in cyber activities. T...
Cyber-attacks have been an increasing threat on people and organisations, which led to massive unple...
Part 6: Ph.D. Track: Methods for the Protection of Infrastructure and ServicesInternational audience...
Ensuring cost-efficient cybersecurity for a networked system is a challenging task. In this task, cy...
The capability related to cybersecurity plays an ever-growing role on overall national security and ...
Cybersecurity and risk management are an inevitable part of organisations decision-making processes....
Abstract. Networked software systems have a remarkable and critical role in the modern society. Ther...
Cyber situation awareness has been recognized as a vital requirement for effective cyber defense. Cy...
The paper discusses the crucial role played by adequate situational awareness in the protection of m...
Abstract Handling cyber threats unavoidably needs to deal with both uncertain and imprecise informat...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
As one of the security components in cyber situational awareness systems, Intrusion Detection Syste...