Proactive cyber-risk assessment is gaining momentum due to the wide range of sectors that can benefit from the prevention of cyber-incidents. The increasing connectivity of digital and (cyber-)physical systems requires more attention to cybersecurity to enhance the integrity, confidentiality, and availability of data. We introduce a statistical framework for the prioritisation of cyber-vulnerabilities, using robust and interpretable regression models to support decision-making. Specifically, we take advantage of mid-quantile regression to deal with ordinal risk assessments, and we compare it to current alternatives for cyber-risk ranking and graded responses, identifying a novel accuracy measure suited for rankings with partial knowledge of...
This chapter reports on a model-based approach to assessing cyber-risks in a cyber-physical system (...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...
In questo articolo, introduciamo una nuova metodologia per la stima dei rischi legati agli attacchi ...
A very crucial issue when dealing with the use of statistical and machine learning methods in Fintec...
peer-reviewedCybercrime is estimated to have cost the global economy just under USD 1 trillion in 2...
A quantitative empirical online study examined a set of 16 security hazards on the Internet and two ...
Citation: Brase, G. L., Vasserman, E. Y., & Hsu, W. (2017). Do Different Mental Models Influence Cyb...
We developed a simulation game to study the effectiveness of decision-makers in overcoming two compl...
Citation: Brase GL, Vasserman EY and Hsu W (2017) Do Different Mental Models Influence Cybersecurity...
The relentless and often haphazard process of tracking and remediating vulnerabilities is a top conc...
Cyber risk assessment requires defined and objective methodologies; otherwise, its results cannot be...
In the information security business, 30 years of practical and theoretical research has resulted in...
Cyber-security domain is inherently dynamic. Not only does system configuration changes frequently (...
AbstractArtificial intelligence (AI) methods are becoming widespread, especially when data are not s...
The information security (IS) risk assessment process is an essential part to organisation's their p...
This chapter reports on a model-based approach to assessing cyber-risks in a cyber-physical system (...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...
In questo articolo, introduciamo una nuova metodologia per la stima dei rischi legati agli attacchi ...
A very crucial issue when dealing with the use of statistical and machine learning methods in Fintec...
peer-reviewedCybercrime is estimated to have cost the global economy just under USD 1 trillion in 2...
A quantitative empirical online study examined a set of 16 security hazards on the Internet and two ...
Citation: Brase, G. L., Vasserman, E. Y., & Hsu, W. (2017). Do Different Mental Models Influence Cyb...
We developed a simulation game to study the effectiveness of decision-makers in overcoming two compl...
Citation: Brase GL, Vasserman EY and Hsu W (2017) Do Different Mental Models Influence Cybersecurity...
The relentless and often haphazard process of tracking and remediating vulnerabilities is a top conc...
Cyber risk assessment requires defined and objective methodologies; otherwise, its results cannot be...
In the information security business, 30 years of practical and theoretical research has resulted in...
Cyber-security domain is inherently dynamic. Not only does system configuration changes frequently (...
AbstractArtificial intelligence (AI) methods are becoming widespread, especially when data are not s...
The information security (IS) risk assessment process is an essential part to organisation's their p...
This chapter reports on a model-based approach to assessing cyber-risks in a cyber-physical system (...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...
In questo articolo, introduciamo una nuova metodologia per la stima dei rischi legati agli attacchi ...