{"id":"https://openalex.org/W4399489273","doi":"https://doi.org/10.3390/jcp4020018","title":"An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure","display_name":"An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure","publication_year":2024,"publication_date":"2024-06-09","ids":{"openalex":"https://openalex.org/W4399489273","doi":"https://doi.org/10.3390/jcp4020018"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp4020018","pdf_url":"https://www.mdpi.com/2624-800X/4/2/18/pdf?version=1717938907","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/4/2/18/pdf?version=1717938907","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109664329","display_name":"Habib El Amin","orcid":null},"institutions":[{"id":"https://openalex.org/I184679254","display_name":"Saint Joseph University","ror":"https://ror.org/044fxjq88","country_code":"LB","type":"funder","lineage":["https://openalex.org/I184679254"]},{"id":"https://openalex.org/I160368002","display_name":"Lebanese University","ror":"https://ror.org/05x6qnc69","country_code":"LB","type":"funder","lineage":["https://openalex.org/I160368002"]}],"countries":["LB"],"is_corresponding":true,"raw_author_name":"Habib El Amin","raw_affiliation_strings":["CIMTI, Faculty of Engineering, University of Saint Joseph, Beirut 1104, Lebanon","Centre de Recherche Scientifique en Ing\u00e9nierie (CRSI), Faculty of Engineering, Lebanese University, Hadath 1533, Lebanon","Potech Labs, P.O.TECH, Beirut 1107, Lebanon"],"affiliations":[{"raw_affiliation_string":"CIMTI, Faculty of Engineering, University of Saint Joseph, Beirut 1104, Lebanon","institution_ids":["https://openalex.org/I184679254"]},{"raw_affiliation_string":"Centre de Recherche Scientifique en Ing\u00e9nierie (CRSI), Faculty of Engineering, Lebanese University, Hadath 1533, Lebanon","institution_ids":["https://openalex.org/I160368002"]},{"raw_affiliation_string":"Potech Labs, P.O.TECH, Beirut 1107, Lebanon","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000209596","display_name":"Abed Ellatif Samhat","orcid":"https://orcid.org/0000-0002-1137-621X"},"institutions":[{"id":"https://openalex.org/I160368002","display_name":"Lebanese University","ror":"https://ror.org/05x6qnc69","country_code":"LB","type":"funder","lineage":["https://openalex.org/I160368002"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Abed Ellatif Samhat","raw_affiliation_strings":["Centre de Recherche Scientifique en Ing\u00e9nierie (CRSI), Faculty of Engineering, Lebanese University, Hadath 1533, Lebanon"],"affiliations":[{"raw_affiliation_string":"Centre de Recherche Scientifique en Ing\u00e9nierie (CRSI), Faculty of Engineering, Lebanese University, Hadath 1533, Lebanon","institution_ids":["https://openalex.org/I160368002"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087009047","display_name":"Maroun Chamoun","orcid":null},"institutions":[{"id":"https://openalex.org/I184679254","display_name":"Saint Joseph University","ror":"https://ror.org/044fxjq88","country_code":"LB","type":"funder","lineage":["https://openalex.org/I184679254"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Maroun Chamoun","raw_affiliation_strings":["CIMTI, Faculty of Engineering, University of Saint Joseph, Beirut 1104, Lebanon"],"affiliations":[{"raw_affiliation_string":"CIMTI, Faculty of Engineering, University of Saint Joseph, Beirut 1104, Lebanon","institution_ids":["https://openalex.org/I184679254"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093480259","display_name":"Lina Oueidat","orcid":null},"institutions":[{"id":"https://openalex.org/I160368002","display_name":"Lebanese University","ror":"https://ror.org/05x6qnc69","country_code":"LB","type":"funder","lineage":["https://openalex.org/I160368002"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Lina Oueidat","raw_affiliation_strings":["Centre de Recherche Scientifique en Ing\u00e9nierie (CRSI), Faculty of Engineering, Lebanese University, Hadath 1533, Lebanon"],"affiliations":[{"raw_affiliation_string":"Centre de Recherche Scientifique en Ing\u00e9nierie (CRSI), Faculty of Engineering, Lebanese University, Hadath 1533, Lebanon","institution_ids":["https://openalex.org/I160368002"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082239159","display_name":"Antoine Feghali","orcid":null},"institutions":[],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Antoine Feghali","raw_affiliation_strings":["Potech Labs, P.O.TECH, Beirut 1107, Lebanon"],"affiliations":[{"raw_affiliation_string":"Potech Labs, P.O.TECH, Beirut 1107, Lebanon","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5109664329"],"corresponding_institution_ids":["https://openalex.org/I184679254","https://openalex.org/I160368002"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":5.798,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.999981,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"4","issue":"2","first_page":"357","last_page":"381"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9915,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.55905},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5305002},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.47771454},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.4234245},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.4131675}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.5908331},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.57987744},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.561014},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.55905},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5305002},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.516248},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.47771454},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.4520833},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.43566868},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.4234245},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.41637295},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.4131675},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.40579847},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3916095},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.355285},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1550771},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C159110408","wikidata":"https://www.wikidata.org/wiki/Q121176","display_name":"Nursing","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp4020018","pdf_url":"https://www.mdpi.com/2624-800X/4/2/18/pdf?version=1717938907","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp4020018","pdf_url":"https://www.mdpi.com/2624-800X/4/2/18/pdf?version=1717938907","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":28,"referenced_works":["https://openalex.org/W2342408547","https://openalex.org/W2424598242","https://openalex.org/W2533698187","https://openalex.org/W2594816977","https://openalex.org/W2745101140","https://openalex.org/W2899031394","https://openalex.org/W2899541238","https://openalex.org/W2947032870","https://openalex.org/W2955894783","https://openalex.org/W2982102463","https://openalex.org/W3002252600","https://openalex.org/W3006161904","https://openalex.org/W3087386645","https://openalex.org/W3108159510","https://openalex.org/W3151685851","https://openalex.org/W4214938748","https://openalex.org/W4234540472","https://openalex.org/W4250531815","https://openalex.org/W4285018249","https://openalex.org/W4293024991","https://openalex.org/W4317910498","https://openalex.org/W4322627484","https://openalex.org/W4352978378","https://openalex.org/W4384153669","https://openalex.org/W4387178135","https://openalex.org/W4387231981","https://openalex.org/W4389668945","https://openalex.org/W77083600"],"related_works":["https://openalex.org/W4399776323","https://openalex.org/W4366290225","https://openalex.org/W4362685783","https://openalex.org/W4242728933","https://openalex.org/W3215166534","https://openalex.org/W3205687007","https://openalex.org/W3191735619","https://openalex.org/W3097113946","https://openalex.org/W2912641888","https://openalex.org/W2493430149"],"abstract_inverted_index":{"Emerging":[0],"cyber":[1,59,78,113,122,148,154],"threats\u2019":[2],"sophistication,":[3],"impact,":[4],"and":[5,29,44,68,74,96,103,127,137,151],"complexity":[6],"rapidly":[7],"evolve,":[8],"confronting":[9],"organizations":[10],"with":[11,166],"demanding":[12],"challenges.":[13],"This":[14],"severe":[15],"escalation":[16],"requires":[17],"a":[18,37,112,161,186],"deeper":[19],"understanding":[20],"of":[21,52,111,146,172,185],"adversary":[22],"dynamics":[23],"to":[24,40,57,92,124],"develop":[25],"enhanced":[26],"defensive":[27],"strategies":[28],"capabilities.":[30],"Cyber":[31,47],"threat":[32,88,114,138,149,168],"actors\u2019":[33],"advanced":[34],"techniques":[35],"necessitate":[36],"proactive":[38],"approach":[39],"managing":[41],"organizations\u2019":[42,66],"risks":[43],"safeguarding":[45],"cyberspace.":[46],"risk":[48,79,135,155,163],"management":[49,80,136,164],"is":[50,90,108],"one":[51],"the":[53,86,98,109,144,179,183],"most":[54],"efficient":[55],"measures":[56],"anticipate":[58],"threats.":[60],"However,":[61],"it":[62],"often":[63],"relies":[64],"on":[65,170],"contexts":[67],"overlooks":[69],"adversaries,":[70],"their":[71],"motives,":[72],"capabilities,":[73],"tactics.":[75],"A":[76],"new":[77],"framework":[81,165,181],"incorporating":[82],"emergent":[83],"information":[84,107],"about":[85,121],"dynamic":[87],"landscape":[89],"needed":[91],"overcome":[93],"these":[94],"limitations":[95],"bridge":[97],"knowledge":[99,120],"gap":[100],"between":[101],"adversaries":[102],"security":[104],"practitioners.":[105],"Such":[106],"product":[110],"intelligence":[115,139,150,169],"process":[116],"that":[117],"proactively":[118],"delivers":[119],"threats":[123],"inform":[125],"decision-making":[126],"strengthen":[128],"defenses.":[129],"In":[130],"this":[131],"paper,":[132],"we":[133,142,159,177],"overview":[134],"frameworks.":[140],"Then,":[141],"highlight":[143],"necessity":[145],"integrating":[147],"assessment":[152],"in":[153,182],"management.":[156],"After":[157],"that,":[158],"propose":[160],"novel":[162],"integrated":[167],"top":[171],"EBIOS":[173],"Risk":[174],"Manager.":[175],"Finally,":[176],"apply":[178],"proposed":[180],"scope":[184],"national":[187],"telecommunications":[188],"organization.":[189]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4399489273","counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-03-23T08:36:00.511378","created_date":"2024-06-11"}