Healthcare organisations are constantly facing sophisticated cyberattacks due to the sensitivity and criticality of patient health care information and wide connectivity of medical devices. Such attacks can pose potential disruptions to critical services delivery. There are number of existing works that focus on using Machine Learning (ML) models for predicting vulnerability and exploitation but most of these works focused on parameterized values to predict severity and exploitability. This paper proposes a novel method that uses ontology axioms to define essential concepts related to the overall healthcare ecosystem and to ensure semantic consistency checking among such concepts. The application of ontology enables the formal specification...
The cyber threat landscape is highly dynamic, posing a significant risk to the operations of systems...
In the paper the usage of the ontological approach, description logics and logical inference to the ...
The integration of networks within an organization made many critical infrastructures (CI) and their...
Healthcare organisations are constantly facing sophisticated cyberattacks due to the sensitivity and...
Digitization in healthcare systems, with the wid adoption of Electronic Health Records, connected me...
Cyber Supply Chain (CSC) security requires a secure integrated network among the sub-systems of the ...
Cyber Supply Chain (CSC) security requires a secure integrated network among the sub-systems of the ...
Cyber Supply Chain (CSC) security requires a secure integrated network among the sub-systems of the ...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
Purpose This paper proposes a novel cyber security risk governance framework and ontology for large ...
Graph knowledge models and ontologies are very powerful modeling and reasoning tools. We propose an ...
Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers expl...
One of the major cyber security challenges we face today is overcoming the current limits of securit...
Cyberattacks in the healthcare sector are constantly increasing due to the increased usage of inform...
AbstractAs the computer network has evolved to provide the user many services, the attacks on these ...
The cyber threat landscape is highly dynamic, posing a significant risk to the operations of systems...
In the paper the usage of the ontological approach, description logics and logical inference to the ...
The integration of networks within an organization made many critical infrastructures (CI) and their...
Healthcare organisations are constantly facing sophisticated cyberattacks due to the sensitivity and...
Digitization in healthcare systems, with the wid adoption of Electronic Health Records, connected me...
Cyber Supply Chain (CSC) security requires a secure integrated network among the sub-systems of the ...
Cyber Supply Chain (CSC) security requires a secure integrated network among the sub-systems of the ...
Cyber Supply Chain (CSC) security requires a secure integrated network among the sub-systems of the ...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
Purpose This paper proposes a novel cyber security risk governance framework and ontology for large ...
Graph knowledge models and ontologies are very powerful modeling and reasoning tools. We propose an ...
Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers expl...
One of the major cyber security challenges we face today is overcoming the current limits of securit...
Cyberattacks in the healthcare sector are constantly increasing due to the increased usage of inform...
AbstractAs the computer network has evolved to provide the user many services, the attacks on these ...
The cyber threat landscape is highly dynamic, posing a significant risk to the operations of systems...
In the paper the usage of the ontological approach, description logics and logical inference to the ...
The integration of networks within an organization made many critical infrastructures (CI) and their...