Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14365/5709
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNour, B.-
dc.contributor.authorUjjwal, S.-
dc.contributor.authorKaracay, L.-
dc.contributor.authorLaaroussi, Z.-
dc.contributor.authorGulen, U.-
dc.contributor.authorTomur, E.-
dc.contributor.authorPourzandi, M.-
dc.date.accessioned2024-12-25T19:23:00Z-
dc.date.available2024-12-25T19:23:00Z-
dc.date.issued2024-
dc.identifier.issn2576-3180-
dc.identifier.urihttps://doi.org/10.1109/IOTM.001.2400061-
dc.identifier.urihttps://hdl.handle.net/20.500.14365/5709-
dc.description.abstractAs technology advances swiftly and the Internet of Things undergoes significant growth, the world is experiencing a surge in data creation. This has resulted in the rapid emergence of novel applications, bringing forth a broader range of intricate and challenging threats that pose difficulties in detection. Therefore, a comprehensive and proactive approach is needed to identify and mitigate security threats. In this article, we combine threat modeling and threat hunting using different approaches in order to provide a more holistic understanding of the security posture of the system, by leveraging the threat model capability in anticipating potential threats and the capability of the threat hunting in identifying evolving and previously unidentified threats. This integration allows for early detection and mitigation of potential threats and enables organizations to enhance their incident response readiness, implement targeted risk mitigation strategies, and fortify their overall cybersecurity posture in the face of evolving and sophisticated threats. © 2018 IEEE.en_US
dc.description.sponsorshipHORIZON EUROPE Framework Programme; Türkiye Bilimsel ve Teknolojik Araştırma Kurumu, TÜBİTAK; European Commission, EC; 1515 Frontier Research and Development Laboratories Support Program, (5169902); JU SNS, (101095759)en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartofIEEE Internet of Things Magazineen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectCyber securityen_US
dc.subjectData creationen_US
dc.subjectIncident responseen_US
dc.subjectNovel applicationsen_US
dc.subjectPotential threatsen_US
dc.subjectPro-active approachen_US
dc.subjectRisk mitigation strategyen_US
dc.subjectSecurity threatsen_US
dc.subjectTechnology advancesen_US
dc.subjectThreat modelingen_US
dc.titleMerging Threat Modeling with Threat Hunting for Dynamic Cybersecurity Defenseen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/IOTM.001.2400061-
dc.identifier.scopus2-s2.0-85208684869en_US
dc.departmentİzmir Ekonomi Üniversitesien_US
dc.authorscopusid57195226408-
dc.authorscopusid58722222100-
dc.authorscopusid57217278858-
dc.authorscopusid57205595238-
dc.authorscopusid56294671700-
dc.authorscopusid6504092986-
dc.authorscopusid15066054500-
dc.identifier.volume7en_US
dc.identifier.issue6en_US
dc.identifier.startpage28en_US
dc.identifier.endpage34en_US
dc.institutionauthor-
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
item.fulltextNo Fulltext-
item.languageiso639-1en-
item.grantfulltextnone-
item.openairetypeArticle-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

1
checked on Jan 22, 2025

Page view(s)

6
checked on Jan 20, 2025

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.