From: A survey of methods supporting cyber situational awareness in the context of smart cities
References | Perspective | Threat enum | Cybersecurity scope | Uncertainty handling | Basis for prioritization | |||||
---|---|---|---|---|---|---|---|---|---|---|
A | S | B | E | I | D | T | ||||
Li et al. [58] | ✓ | Manual | ✓ |
| Mitigation prioritization | |||||
Kelarestaghi et al. [59] | ✓ | Manual | ✓ | N/A | Impact assessment | |||||
Kotzanikolaou et al. [60] | ✓ | Manual | Not specified |
| Mitigation prioritization | |||||
Sicari et al. [62] | ✓ | Manual | ✓ | ✓ |
| Exploitability level | ||||
Wang et al. [63] | ✓ | Manual | ✓ |
| Threat factor | |||||
Radanliev et al. [65] | ✓ | Manual | ✓ | Economic impact | ||||||
Nazeeruddin [66] | ✓ | Manual | ✓ |
| Threat factor | |||||
Shivraj [67] | ✓ | Manual | ✓ |
| Threat factor | |||||
Mohsin et al. [68] | ✓ | Manual | ✓ | ✓ |
| Prioritized configuration | ||||
Falco et al. [69] | ✓ | Automatic | ✓ |
| Attack path projection | |||||
Angelini et al. [70] | ✓ | Manual | Not specified |
| Operational impact | |||||
Wang et al. [71] | ✓ | Manual | ✓ | ✓ |
| Threat factor | ||||
Bou-Harb et al. [73] | ✓ | Automatic | ✓ |
| Situational awareness |