Cyber security has become a serious challenge for organizations due to growing use of the Internet and increasing values of information that are stored in organizations' information systems. Because of the complexity and the number of different variables involved with information security, a special analytical tool is required to address the problem of how to balance the investment in different parts of the system in order to reduce the losses due to cyber attacks. Using the System Dynamics approach as an effective analytical tool is proposed to demonstrate dealing of complex situations due to cyber attacks involving different variables such as attractiveness of targets to losses, and their inter-relationships. Using this model, a casual lo...
The importance of cybersecurity has increased in recent years and more and more organizations have t...
Cyberattacks are a constant threat to organisations worldwide. The uncertainty and difficulty of pro...
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats ...
The results of the development of the model of the antagonistic agents behavior in a cyber conflict ...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...
Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Enginee...
In this paper, we assume the security level of a system is a quantifiable metric and apply the insur...
The authors make an attempt to economize the 'feeling of being secure' in times of cyber threats. Th...
In the information age, the scale and scope of cyber attacks on information systems is on the rise. ...
Cyber-attacks are an important issue faced by all organizations. Securing information systems is cri...
Modern Cyber-Physical Systems (CPS) show increasing levels of automation, intelligence, and optimiza...
Proper evaluation of the risk associated to a cyber attack is a crucial aspect for many companies. T...
In doing the ICT capacity planning, most organizations or institutions ignore unconsciously other co...
With the evolution of information, communications and technologies, modern industrial control system...
The importance of cybersecurity has increased in recent years and more and more organizations have t...
Cyberattacks are a constant threat to organisations worldwide. The uncertainty and difficulty of pro...
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats ...
The results of the development of the model of the antagonistic agents behavior in a cyber conflict ...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...
Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Enginee...
In this paper, we assume the security level of a system is a quantifiable metric and apply the insur...
The authors make an attempt to economize the 'feeling of being secure' in times of cyber threats. Th...
In the information age, the scale and scope of cyber attacks on information systems is on the rise. ...
Cyber-attacks are an important issue faced by all organizations. Securing information systems is cri...
Modern Cyber-Physical Systems (CPS) show increasing levels of automation, intelligence, and optimiza...
Proper evaluation of the risk associated to a cyber attack is a crucial aspect for many companies. T...
In doing the ICT capacity planning, most organizations or institutions ignore unconsciously other co...
With the evolution of information, communications and technologies, modern industrial control system...
The importance of cybersecurity has increased in recent years and more and more organizations have t...
Cyberattacks are a constant threat to organisations worldwide. The uncertainty and difficulty of pro...
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats ...