Vis enkel innførsel

dc.contributor.authorChockalingam, Sabarathinam
dc.contributor.authorMaathuis, Clara
dc.date.accessioned2024-01-30T10:07:58Z
dc.date.available2024-01-30T10:07:58Z
dc.date.created2023-10-23T16:15:25Z
dc.date.issued2023
dc.identifier.citationProceedings of the ... European conference on information warfare and security. 2023, 22 (1), 124-131.en_US
dc.identifier.issn2048-8602
dc.identifier.urihttps://hdl.handle.net/11250/3114456
dc.description.abstractOver the last years, cyber-attacks are increasing in organizations especially due to the use of emerging technologies and transformation in terms of how we work. Informed decision-making in cyber security is critical to prevent, detect, respond, and recover from cyber-attacks effectively and efficiently. In cyber security, Decision Support System (DSS) plays a crucial role especially in supporting security analysts, managers, and operators in making informed decisions. Artificial Intelligence (AI)-based techniques like Bayesian Networks, Decision Trees are used as an underlying approach in such DSSs. Furthermore, Influence Diagrams (IDs) possess the capability to support informed decision-making based on its existing applications in other domains like medical. However, the complete capability and potential of IDs are not utilised in cyber security especially in terms of its explainable nature for different stakeholders and existing applications in other domains. Therefore, this research tackles the following research question: “What are potential applications of Influence Diagrams (IDs) in cyber security?”. We identified applications of IDs in different domains and then translated it to design potential applications for cyber security issues. In the future, this will help both researchers and practitioners to develop and implement IDs for cyber security-related problems, which in turn will enhance decision-making especially due to its explainable nature for different stakeholders.en_US
dc.language.isoengen_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.titleInfluence Diagrams in Cyber Security: Conceptualization and Potential Applicationsen_US
dc.title.alternativeInfluence Diagrams in Cyber Security: Conceptualization and Potential Applicationsen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.source.pagenumber124-131en_US
dc.source.volume22en_US
dc.source.journalProceedings of the ... European conference on information warfare and securityen_US
dc.source.issue1en_US
dc.identifier.doi10.34190/eccws.22.1.1303
dc.identifier.cristin2187722
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal