rity), IEEE International Conference on High Perfor-
mance and Smart Computing (HPSC), and IEEE In-
ternational Conference on Intelligent Data and Secu-
rity (IDS), pages 197–202. IEEE.
Gounder, M. P. and Nahar, J. (2018). Practicality of
data mining for proficient network security manage-
ment. In 2018 5th Asia-Pacific World Congress on
Computer Science and Engineering (APWC on CSE),
pages 149–155. IEEE.
Hellal, A. and Romdhane, L. B. (2016). Minimal contrast
frequent pattern mining for malware detection. Com-
puters & Security, 62:19–32.
HM Government and PWC. 2015 Information Security
Breaches Survey. https://www.pwc.co.uk/assets/pdf/
2015-isbs-executive-summary-02.pdf.
Huang, K., Zhou, C., Tian, Y.-C., Tu, W., and Peng, Y.
(2017). Application of bayesian network to data-
driven cyber-security risk assessment in scada net-
works. In 2017 27th International Telecommunica-
tion Networks and Applications Conference (ITNAC),
pages 1–6. IEEE.
KAITS. Industrial Technology Security Hub. http://www.
kaits.or.kr/index.do.
Kakavand, M., Mustapha, N., Mustapha, A., and Abdullah,
M. T. (2015). A text mining-based anomaly detection
model in network security. Global Journal of Com-
puter Science and Technology.
Kakushadze, Z. and Yu, W. (2019). Machine learning risk
models. Journal of Risk & Control, 6(1):37–64.
Kaplan, S. and Garrick, B. J. (1981). On the quantitative
definition of risk. Risk analysis, 1(1):11–27.
Lu, H., Zhang, G., and Shen, Y. (2019). Cyber security
situation prediction model based on gwo-svm. In In-
ternational Conference on Innovative Mobile and In-
ternet Services in Ubiquitous Computing, pages 162–
171. Springer.
Lu, Y.-B., Din, S.-C., Zheng, C.-F., and Gao, B.-J. (2010).
Using multi-feature and classifier ensembles to im-
prove malware detection. Journal of CCIT, 39(2):57–
72.
Mike Sconzo. SecRepo.com - Samples of Security Related
Data.
Mirjalili, S., Mirjalili, S. M., and Lewis, A. (2014). Grey
wolf optimizer. Advances in Engineering Software,
69:46 – 61.
Norouzi, M., Souri, A., and Samad Zamini, M. (2016).
A data mining classification approach for behavioral
malware detection. Journal of Computer Networks
and Communications, 2016:1.
Oprea, A., Li, Z., Norris, R., and Bowers, K. (2018). Made:
Security analytics for enterprise threat detection. In
Proceedings of the 34th Annual Computer Security
Applications Conference, pages 124–136. ACM.
Pat
´
e-Cornell, M.-E., Kuypers, M., Smith, M., and Keller, P.
(2018). Cyber risk management for critical infrastruc-
ture: a risk analysis model and three case studies. Risk
Analysis, 38(2):226–241.
Rawat, D. B., Doku, R., and Garuba, M. (2019). Cyber-
security in big data era: From securing big data to
data-driven security. IEEE Transactions on Services
Computing.
Rieck, K., Trinius, P., Willems, C., and Holz, T. (2011). Au-
tomatic analysis of malware behavior using machine
learning. Journal of Computer Security, 19(4):639–
668.
Robert H. Courtney, J. (1977). Security Risk Assessment in
Electronic Data Processing Systems. In Proceedings
of the June 13-16, 1977, National Computer Confer-
ence, AFIPS ’77, pages 97–104, New York, NY, USA.
ACM.
Ruan, K. (2017). Introducing cybernomics: A unifying eco-
nomic framework for measuring cyber risk. Comput-
ers & Security, 65:77–89.
Santini, P., Gottardi, G., Baldi, M., and Chiaraluce, F.
(2019). A data-driven approach to cyber risk assess-
ment. Security and Communication Networks, 2019.
Sarkar, S., Almukaynizi, M., Shakarian, J., and Shakarian,
P. (2019). Mining user interaction patterns in the dark-
web to predict enterprise cyber incidents. Social Net-
work Analysis and Mining, 9(1):57.
Schultz, M. G., Eskin, E., Zadok, F., and Stolfo, S. J.
(2001). Data mining methods for detection of new
malicious executables. In Security and Privacy, 2001.
S&P 2001. Proceedings. 2001 IEEE Symposium on,
pages 38–49. IEEE.
Shabtai, A., Moskovitch, R., Feher, C., Dolev, S., and
Elovici, Y. (2012). Detecting unknown malicious code
by applying classification techniques on opcode pat-
terns. Security Informatics, 1(1):1.
Shin, J., Son, H., and Heo, G. (2013). Cyber security risk
analysis model composed with activity-quality and
architecture model. In International Conference on
Computer, Networks and Communication Engineer-
ing (ICCNCE 2013). Atlantis Press.
Sommestad, T., Ekstedt, M., and Johnson, P. (2010). A
probabilistic relational model for security risk analy-
sis. Computers & security, 29(6):659–679.
Suh-Lee, C., Jo, J.-Y., and Kim, Y. (2016). Text mining for
security threat detection discovering hidden informa-
tion in unstructured log messages. In Communications
and Network Security (CNS), 2016 IEEE Conference
on, pages 252–260. IEEE.
Torres, J. M., Comesa
˜
na, C. I., and Garc
´
ıa-Nieto, P. J.
(2019). Machine learning techniques applied to cyber-
security. International Journal of Machine Learning
and Cybernetics, pages 1–14.
VERIZON. VERIS Community Database.
Using Feature Analysis to Guide Risk Calculations of Cyber Incidents
195