You are on page 1of 27

FRAMEWORKS FOR INFORMATION SE

No. Title

Framework to Manage Information Security for Malaysian Academic


1
Environment

Information security policies’ compliance: a perspective for higher


2
education institutions

3 A process framework for information security management

Towards Implementation of the Information Security Strategies in


4
South Africa

Information Security Risk Management in Higher Education


5
Institutions: From Processes to Operationalization
A STUDY ON INTEGRATING PENETRATION TESTING INTO THE
6 INFORMATION SECURITY FRAMEWORK FOR MALAYSIAN
HIGHER EDUCATION INSTITUTIONS

An IT Value Management Capability Model for Portuguese


7
Universities: A Delphi Study

Towards an Unified Information Systems Reference Model for Higher


8
Education Institutions

A Framework for Managing User-defined Security Policies to Support


9
Network Security Functions

An Empirical Study on the Effect of Information Security Activities:


10
Focusing on Technology, Institution, and Awareness
Integration of IT Frameworks for the Management of Information
11 Security within Industrial Control Systems providing Metrics and
Indicators

A Methodological Proposal Concerning to the Management of


12
Information Security in Industrial Control Systems

A framework to guide the implementation of Proactive Digital


13
Forensics in organizations

Cybercrime in Ecuador, an Exploration, which allows to define


14
National Cybersecurity Policies

Data Mining Model in the Discovery of Trends and Patterns of Intruder


15
Attacks on the Data Network as a Public-Sector Innovation
FRAMEWORKS FOR INFORMATION SECURITY MANAGEMENT
Authors Year

Zuraini I, Maslin M,
2010
Zailani M, Dayang S

S Hina, PDD Dominic 2018

K Haufe, R Colomo-
2016
Palacios, S Dzombeta

Moyahabo R., Sello N.,


2012
Isaac O.

W.Hommel, S. Metzger,
M. Steinke
2015
Kang C., Joseph Ng P. 2016

Cristiano P., Carlos F.,


2018
Luis A.

Felix S., Joan A., Baptista


2017
B.

E: Kim, K. Kim, S. Lee, J.


2018
Jeong, H. Kim

WookJoon Sung,
2017
SeungYeoup Kang
F.Bustamante, W.
Fuertes, P. Díaz, and T. 2017
Toulkeridis

F.Bustamante, W.
Fuertes, P. Díaz, and T. 2016
Toulkeridis

CP Grobler, CP
2010
Louwrens, SH von Solms

M. Ron, W. Fuertes, M.
Bonilla, T. Toulkeridis and 2018
J. Díaz

M. Macas, L. Lagla, W.
Fuertes, G. Guerrero, and 2017
T. Toulkeridis
SECURITY MANAGEMENT
Reference (Bibtex)
@article{ismail2010framework,
title={Framework to manage information security for Malaysian Academic Environment},
author={Ismail, Zuraini and Masrom, Maslin and Sidek, Z and Hamzah, D},
journal={Information Assurance \& Cybersecurity},
volume={2010},
pages={1--16},
year={2010}
}

@article{hina2018information,
title={Information security policies’ compliance: a perspective for higher education institutions},
author={Hina, Sadaf and Dominic, P Dhanapal Durai},
journal={Journal of Computer Information Systems},
pages={1--11},
year={2018},
publisher={Taylor \& Francis}
}

@article{haufe2016process,
title={A process framework for information security management},
author={Haufe, Knut and Colomo-Palacios, Ricardo and Dzombeta, Srdan and Brandis, Knud
and Stantchev, Vladimir},
journal={International Journal of Information Systems and Project Management},
volume={4},
number={4},
pages={27--47},
year={2016},
publisher={Directory of Open Access Journals}
}

@article{mohlabeng2012towards,
title={Towards Implementation of the Information Security Strategies in South Africa},
author={Mohlabeng, Moyahabo Rossett and Mokwena, Sello Nicholas and Osunmakinde, Isaac
O},
journal={Journal of Emerging Trends in Computing and Information Sciences},
volume={3},
number={11},
year={2012},
publisher={Citeseer}
}

@article{hommel2015information,
title={Information Security Risk Management in Higher Education Institutions: From Processes
to Operationalization},
author={Hommel, Wolfgang and Metzger, Stefan and Steinke, Michael},
journal={EUNIS Journal of Higher Education IT},
year={2015},
publisher={EUNIS}
}
@inproceedings{kang2015study,
title={A study on integrating penetration testing into the information security framework for
Malaysian higher education institutions},
author={Kang, CM and JosephNg, PS and Issa, K},
booktitle={Mathematical Sciences and Computing Research (iSMSC), International Symposium
on},
pages={156--161},
year={2015},
organization={IEEE}
}

@article{pereira2018value,
title={An IT Value Management Capability Model for Portuguese Universities: A Delphi Study},
author={Pereira, Cristiano and Ferreira, Carlos and Amaral, Luis},
journal={Procedia computer science},
volume={138},
pages={612--620},
year={2018},
publisher={Elsevier}
}

@article{sanchez2017towards,
title={Towards an Unified Information Systems Reference Model for Higher Education
Institutions},
author={Sanchez-Puchol, Felix and Pastor-Collado, Joan A and Borrell, Baptista},
journal={Procedia Computer Science},
volume={121},
pages={542--553},
year={2017},
publisher={Elsevier}
}

@inproceedings{kim2018framework,
title={A Framework for Managing User-defined Security Policies to Support Network Security
Functions},
author={Kim, Eunsoo and Kim, Kuyju and Lee, Seungjin and Jeong, Jaehoon Paul and Kim,
Hyoungshick},
booktitle={Proceedings of the 12th International Conference on Ubiquitous Information
Management and Communication},
pages={85},
year={2018},
organization={ACM}
}

@inproceedings{sung2017empirical,
title={An Empirical Study on the Effect of Information Security Activities: Focusing on
Technology, Institution, and Awareness},
author={Sung, WookJoon and Kang, SeungYeoup},
booktitle={Proceedings of the 18th Annual International Conference on Digital Government
Research},
pages={84--93},
year={2017},
organization={ACM}
}
@inproceedings{bustamante2017integration,
title={Integration of IT frameworks for the management of information security within industrial
control systems providing metrics and indicators},
author={Bustamante, Fabi{\'a}n and Fuertes, Walter and D{\'\i}az, Pa{\'u}l and Toulkeridis,
Theofilos},
booktitle={Electronics, Electrical Engineering and Computing (INTERCON), 2017 IEEE XXIV
International Conference on},
pages={1--4},
year={2017},
organization={IEEE}
}

@inproceedings{bustamante2016methodological,
title={A methodological proposal concerning to the management of information security in
Industrial Control Systems},
author={Bustamante, Fabi{\'a}n and Fuertes, Walter and D{\'\i}az, Pa{\'u}l and Toulkeridis,
Theofilos},
booktitle={Ecuador Technical Chapters Meeting (ETCM), IEEE},
pages={1--6},
year={2016},
organization={IEEE}
}

@inproceedings{grobler2010framework,
title={A framework to guide the implementation of proactive digital forensics in organisations},
author={Grobler, CP and Louwrens, CP and von Solms, Sebastiaan H},
booktitle={2010 International conference on availability, reliability and security},
pages={677--682},
year={2010},
organization={IEEE}
}

@inproceedings{ron2018cybercrime,
title={Cybercrime in Ecuador, an exploration, which allows to define national cybersecurity
policies},
author={Ron, Mario and Fuertes, Walter and Bonilla, Marco and Toulkeridis, Theofilos and Diaz,
Javier},
booktitle={2018 13th Iberian Conference on Information Systems and Technologies (CISTI)},
pages={1--7},
year={2018},
organization={IEEE}
}

@inproceedings{macas2017data,
title={Data Mining model in the discovery of trends and patterns of intruder attacks on the data
network as a public-sector innovation},
author={Macas, Mayra and Lagla, Lidia and Fuertes, Walter and Guerrero, Graciela and
Toulkeridis, Theofilos},
booktitle={eDemocracy \& eGovernment (ICEDEG), 2017 Fourth International Conference on},
pages={55--62},
year={2017},
organization={IEEE}
}
Recopilar y estudiar los diferentes algoritmos
No. Title

Cybersecurity in the mathematically uniform algorithmic space of the


1
distributed computing

WAMS Cyber-Physical Test Bed for Power System, Cybersecurity


2
Study, and Data Mining

CLaaS: Cybersecurity Lab as a Service -- Design, Analysis, and


3
Evaluation

Multiclass Network Attack Classifier Using CNN Tuned with Genetic


4
Algorithms

A Machine Learning Framework for Domain Generation Algorithm


5
(DGA)-Based Malware Detection
Continuous Monitoring and Assessment of Cybersecurity Risks in
6
Large Computing Infrastructures

Model-Based Cybersecurity Assessment with NESCOR Smart Grid


7
Failure Scenarios

Building a Platform for Software-Defined Networking Cybersecurity


8
Applications

9 Cognitive clustering algorithm for efficient cybersecurity applications

A Case Study in Tailoring a Bio-Inspired Cyber-Security Algorithm:


10
Designing Anomaly Detection for Multilayer Networks
Strategic FRTU Deployment Considering Cybersecurity in Secondary
11
Distribution Network

12 Dynamic Logic Machine Learning for Cybersecurity

Between Data Mining and Predictive Analytics Techniques to


13
Cybersecurity Protection on eLearning Environments

14 Cryptographic Controls: The Heart of Cybersecurity

15 The Concept of Applying Lifelong Learning Paradigm to Cybersecurity

16 Review: machine learning techniques applied to cybersecurity


An Investigation of Information Granulation Techniques in
17
Cybersecurity

18 Cybersecurity for Supervisory Control and Data Acquisition

The Future of Cybersecurity: Major Role of Artificial Intelligence,


19
Machine Learning, and Deep Learning in Cyberspace

20 Cybersecurity and AI

Developing proactive defenses for computer networks with


21
coevolutionary genetic algorithms

Adversarial co-evolution of attack and defense in a segmented


22
computer network environment
Investigating coevolutionary archive based genetic algorithms on
23
cyber defense networks

Evolving sharing strategies in cybersecurity information exchange


24
framework

Multi-Perspective Machine Learning a Classifier Ensemble Method for


25
Intrusion Detection

26 The Impact of Defensive Programming on I/O Cybersecurity Attacks

Adversarially Robust Malware Detection Using Monotonic


27
Classification
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk
28
Using Reinforcement Learning

Recent Granular Computing Implementations and its Feasibility in


29
Cybersecurity Domain

30
ecopilar y estudiar los diferentes algoritmos aplicados a la ciberseguridad
Authors Year

Yu. S. Zatuliveter; E. A.
2017
Fishchenko

U Adhikari, T Morris, S
2017
Pan

C Tunc, S Hariri, FDLP


2015
Montero

R Blanco, P Malagón, JJ
2018
Cilla

Y Li, K Xiong, T Chin, C


2019
Hu
MSK Awan, P Burnap, O
2015
Rana

S Jauhar, B Chen, WG
2015
Temple, X Dong

C Song, A Perez-Pons,
2016
KK Yen

R Kozma, JLG Rosa 2013

G Suárez, L Gallos, N
2018
Fefferman
C Liao, CW Ten, S Hu 2013

L Perlovsky, O
2014
Shevchenko

J Manuel, R Cordeiro, C
2017
Silva

KM Martin 2018

M Choraś, R Kozik, R
2017
Renk, W Hołubowicz

JM Torres, CI Comesaña,
2019
PJ García-Nieto
SS Isah, A Selamat, R
2019
Ibrahim, O Krejcar

SN Shinde, RP Shinde 2018

B Geluvaraj, PM
2019
Satwik, TAA Kumar

S Mohanty, S Vyas 2018

AE Lugo, D Garcia, E
2017
Hemberg

E Hemberg, JR Zipkin,
2018
RW Skowyra
D Garcia, AE Lugo, E
2017
Hemberg

I Vakilinia, S Sengupta 2017

ST Miller, C Busby-Earle 2017

JK Teto, R Bearden, DCT


2017
Lo

I Incer, M Theodorides, S
2018
Afroz, D Wagner
R Ganesan, S Jajodia, A
2016
Shah, H Cam

M Pawlicki, M Choraś, R
2018
Kozik
os aplicados a la ciberseguridad
Reference (Bibtex)
@inproceedings{zatuliveter2017cybersecurity,
title={Cybersecurity in the mathematically uniform algorithmic space of the distributed
computing},
author={Zatuliveter, Yu S and Fishchenko, EA},
booktitle={2017 Tenth International Conference Management of Large-Scale System
Development (MLSD)},
pages={1--4},
year={2017},
organization={IEEE}
}

@article{adhikari2017wams,
title={WAMS cyber-physical test bed for power system, cybersecurity study, and data mining},
author={Adhikari, Uttam and Morris, Thomas and Pan, Shengyi},
journal={IEEE Transactions on Smart Grid},
volume={8},
number={6},
pages={2744--2753},
year={2017},
publisher={IEEE}
}

@inproceedings{tunc2015claas,
title={CLaaS: Cybersecurity Lab as a Service--Design, Analysis, and Evaluation},
author={Tunc, Cihan and Hariri, Salim and Montero, Fabian De La Pe{\~n}a and Fargo, Farah
and Satam, Pratik},
booktitle={2015 International Conference on Cloud and Autonomic Computing},
pages={224--227},
year={2015},
organization={IEEE}
}

@inproceedings{blanco2018multiclass,
title={Multiclass Network Attack Classifier Using CNN Tuned with Genetic Algorithms},
author={Blanco, Roberto and Malag{\'o}n, Pedro and Cilla, Juan J and Moya, Jos{\'e} M},
booktitle={2018 28th International Symposium on Power and Timing Modeling, Optimization
and Simulation (PATMOS)},
pages={177--182},
year={2018},
organization={IEEE}
}

@article{li2019machine,
title={A Machine Learning Framework for Domain Generation Algorithm (DGA)-Based Malware
Detection},
author={Li, Yi and Xiong, Kaiqi and Chin, Tommy and Hu, Chengbin},
journal={IEEE Access},
year={2019},
publisher={IEEE}
}
@inproceedings{awan2015continuous,
title={Continuous Monitoring and Assessment of Cybersecurity Risks in Large Computing
Infrastructures},
author={Awan, Malik Shahzad Kaleem and Burnap, Peter and Rana, Omer and Javed, Amir},
booktitle={2015 IEEE 17th International Conference on High Performance Computing and
Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security,
and 2015 IEEE 12th International Conference on Embedded Software and Systems},
pages={1442--1447},
year={2015},
organization={IEEE}
}

@inproceedings{jauhar2015model,
title={Model-based cybersecurity assessment with nescor smart grid failure scenarios},
author={Jauhar, Sumeet and Chen, Binbin and Temple, William G and Dong, Xinshu and
Kalbarczyk, Zbigniew and Sanders, William H and Nicol, David M},
booktitle={2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing
(PRDC)},
pages={319--324},
year={2015},
organization={IEEE}
}

@inproceedings{song2016building,
title={Building a Platform for Software-Defined Networking Cybersecurity Applications},
author={Song, Chongya and Perez-Pons, Alexander and Yen, Kang K},
booktitle={2016 15th IEEE International Conference on Machine Learning and Applications
(ICMLA)},
pages={482--487},
year={2016},
organization={IEEE}
}

@inproceedings{kozma2013cognitive,
title={Cognitive clustering algorithm for efficient cybersecurity applications},
author={Kozma, Robert and Rosa, Joao Luis G and Piazentin, Denis RM},
booktitle={The 2013 International Joint Conference on Neural Networks (IJCNN)},
pages={1--8},
year={2013},
organization={IEEE}
}

@inproceedings{suarez2018case,
title={A Case Study in Tailoring a Bio-Inspired Cyber-Security Algorithm: designing anomaly
detection for multilayer networks},
author={Su{\'a}rez, Gonzalo and Gallos, Lazaros and Fefferman, Nina},
booktitle={2018 IEEE Security and Privacy Workshops (SPW)},
pages={281--286},
year={2018},
organization={IEEE}
}
@article{liao2013strategic,
title={Strategic FRTU deployment considering cybersecurity in secondary distribution network},
author={Liao, Chen and Ten, Chee-Wooi and Hu, Shiyan},
journal={IEEE Transactions on Smart Grid},
volume={4},
number={3},
pages={1264--1274},
year={2013},
publisher={IEEE}
}
@incollection{perlovsky2014dynamic,
title={Dynamic logic machine learning for cybersecurity},
author={Perlovsky, Leonid and Shevchenko, Olexander},
booktitle={Cybersecurity Systems for Human Cognition Augmentation},
pages={85--98},
year={2014},
publisher={Springer}
}

@inproceedings{manuel2017between,
title={Between Data Mining and Predictive Analytics Techniques to Cybersecurity Protection on
eLearning Environments},
author={Manuel, Jos{\'e} and Cordeiro, Raul and Silva, Carla},
booktitle={Proceedings of the Computational Methods in Systems and Software},
pages={185--194},
year={2017},
organization={Springer}
}

@article{martin2018cryptographic,
title={Cryptographic Controls: The Heart of Cybersecurity},
author={Martin, Keith M},
journal={Handbook of Security Science},
pages={1--8},
year={2018},
publisher={Springer}
}

@inproceedings{choras2017concept,
title={The concept of applying lifelong learning paradigm to cybersecurity},
author={Chora{\'s}, Micha{\l} and Kozik, Rafa{\l} and Renk, Rafa{\l} and Ho{\l}ubowicz, Witold},
booktitle={International Conference on Intelligent Computing},
pages={663--671},
year={2017},
organization={Springer}
}

@article{torres2019machine,
title={machine learning techniques applied to cybersecurity},
author={Torres, Javier Mart{\'\i}nez and Comesa{\~n}a, Carla Iglesias and Garc{\'\i}a-Nieto,
Paulino J},
journal={International Journal of Machine Learning and Cybernetics},
pages={1--14},
year={2019},
publisher={Springer}
}
@inproceedings{isah2019investigation,
title={An Investigation of Information Granulation Techniques in Cybersecurity},
author={Isah, Sani Suleiman and Selamat, Ali and Ibrahim, Roliana and Krejcar, Ondrej},
booktitle={Asian Conference on Intelligent Information and Database Systems},
pages={151--163},
year={2019},
organization={Springer}
}

@inproceedings{shinde2018cybersecurity,
title={Cybersecurity for Supervisory Control and Data Acquisition},
author={Shinde, Sahebrao N and Shinde, Reena P},
booktitle={Cyber Security: Proceedings of CSI 2015},
pages={361--371},
year={2018},
organization={Springer}
}

@inproceedings{geluvaraj2019future,
title={The Future of Cybersecurity: Major Role of Artificial Intelligence, Machine Learning, and
Deep Learning in Cyberspace},
author={Geluvaraj, B and Satwik, PM and Kumar, TA Ashok},
booktitle={International Conference on Computer Networks and Communication Technologies},
pages={739--747},
year={2019},
organization={Springer}
}

@incollection{mohanty2018cybersecurity,
title={Cybersecurity and AI},
author={Mohanty, Soumendra and Vyas, Sachin},
booktitle={How to Compete in the Age of Artificial Intelligence},
pages={143--153},
year={2018},
publisher={Springer}
}

@inproceedings{lugo2017developing,
title={Developing proactive defenses for computer networks with coevolutionary genetic
algorithms},
author={Lugo, Anthony Erb and Garcia, Dennis and Hemberg, Erik and O'Reilly, Una-May},
booktitle={Proceedings of the Genetic and Evolutionary Computation Conference Companion},
pages={273--274},
year={2017},
organization={ACM}
}

@inproceedings{hemberg2018adversarial,
title={Adversarial co-evolution of attack and defense in a segmented computer network
environment},
author={Hemberg, Erik and Zipkin, Joseph R and Skowyra, Richard W and Wagner, Neal and
O'Reilly, Una-May},
booktitle={Proceedings of the Genetic and Evolutionary Computation Conference Companion},
pages={1648--1655},
year={2018},
organization={ACM}
}
@inproceedings{garcia2017investigating,
title={Investigating coevolutionary archive based genetic algorithms on cyber defense
networks},
author={Garcia, Dennis and Lugo, Anthony Erb and Hemberg, Erik and O'Reilly, Una-May},
booktitle={Proceedings of the Genetic and Evolutionary Computation Conference Companion},
pages={1455--1462},
year={2017},
organization={ACM}
}

@inproceedings{vakilinia2017evolving,
title={Evolving sharing strategies in cybersecurity information exchange framework},
author={Vakilinia, Iman and Sengupta, Shamik and others},
booktitle={Proceedings of the Genetic and Evolutionary Computation Conference Companion},
pages={309--310},
year={2017},
organization={ACM}
}

@inproceedings{miller2017multi,
title={Multi-perspective machine learning a classifier ensemble method for intrusion detection},
author={Miller, Sean T and Busby-Earle, Curtis},
booktitle={Proceedings of the 2017 International Conference on Machine Learning and Soft
Computing},
pages={7--12},
year={2017},
organization={ACM}
}

@inproceedings{teto2017impact,
title={The Impact of Defensive Programming on I/O Cybersecurity Attacks},
author={Teto, Joel Kamdem and Bearden, Ruth and Lo, Dan Chia-Tien},
booktitle={Proceedings of the SouthEast Conference},
pages={102--111},
year={2017},
organization={ACM}
}

@inproceedings{incer2018adversarially,
title={Adversarially robust malware detection using monotonic classification},
author={Incer, Inigo and Theodorides, Michael and Afroz, Sadia and Wagner, David},
booktitle={Proceedings of the Fourth ACM International Workshop on Security and Privacy
Analytics},
pages={54--63},
year={2018},
organization={ACM}
}
@article{ganesan2016dynamic,
title={Dynamic scheduling of cybersecurity analysts for minimizing risk using reinforcement
learning},
author={Ganesan, Rajesh and Jajodia, Sushil and Shah, Ankit and Cam, Hasan},
journal={ACM Transactions on Intelligent Systems and Technology (TIST)},
volume={8},
number={1},
pages={4},
year={2016},
publisher={ACM}
}

@inproceedings{pawlicki2018recent,
title={Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain},
author={Pawlicki, Marek and Chora{\'s}, Micha{\l} and Kozik, Rafa{\l}},
booktitle={Proceedings of the 13th International Conference on Availability, Reliability and
Security},
pages={61},
year={2018},
organization={ACM}
}

You might also like