International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.4, July 2024
34
[15] “Common W eakness Scoring System (CWSSTM)”, accessed ( 2023,Feb)
https://cwe.mitre.org/cwss/cwss_v1.0.1.html
[16] “2022 CWE Top 25 Most Dangerous Software Weaknesses ”, accessed ( 2023,Feb).
https://cwe.mitre.org/top25/archive/2022/2022_cwe_top25.html
[17] [17] J. E. and R. S.. Jon Baker,( 2021), Available at: https://medium.com/mitre-
engenuity/cve-mitre-att-ck-to-understand-vulnerability- impact-c40165111bf7
[18] “iso:22300,” ISO 22300:2018. accessed ( 2023 ,Feb), Available at:
https://www.iso.org/obp/ui#iso:std:iso:22300:ed-2:v1:en
[19] M. G. Cains, L. Flora, D. Taber, Z. King, and D. S. Henshel,(2022) “Defining Cyber Security and
Cyber Security Risk within a Multidisciplinary Context using Expert Elicitation,” Risk Analysis,
vol. 42, no. 8, pp. 1643–1669, doi: 10.1111/risa.13687.
[20] T. J. Mohammed and N. A. Jasim, (2022) “Designing a model to protect documented information
according to the integration of some international standards (ISO 27001: 2013) (ISO 10013: 2021)”,
Int J Health Sci (Qassim), pp. 10684–10697, doi: 10.53730/ijhs.v6ns3.8376 .
[21] NIST, “cybersecurity.” accessed. (2023,Feb).Available at
https://csrc.nist.gov/glossary/term/cybersecurity
[22] “An Introduction to the Components of the Framework. Accessed, Feb.2023,
https://www.nist.gov/cyberframework/online-learning/components-framework .
[23] V. Legoy, M. Caselli, C. Seifert, and A. Peter, (2020) “Automated Retrieval of ATT&CK Tactics
and Techniques for Cyber Threat Reports”, Available: http://arxiv.org/abs/2004.14322
[24] M. Tatam, B. Shanmugam, S. Azam, and K. Kannoorpatti, (2021) “A review of threat modelling
approaches for APT-style attacks,”, Heliyon, vol. 7, no. 1. Elsevier Ltd, doi:
10.1016/j.heliyon.2021.e05969.
[25] C. S. Johnson, M. L. Badger, D. A. Waltermire, J. Snyder, and C. Skorupka, (2016) “Guide to
Cyber Threat Information Sharing,” Gaithersburg, MD, Oct. 2016. Available at:
http://dx.doi.org/10.6028/NIST.SP.800-150
[26] H. Manocha, A. Srivastava, C. Verma, R. Gupta, and B. Bansal, (2022) “Security Assessment
Rating Framework for Enterprises using MITRE Health Sci (Qassim), pp. 10684–10697, Available
at:https://doi.org/10.48550/arXiv.2108.06559
[27] Rahman MR, Hezaveh RM, Williams L. (2023) “What are the attackers doing now?
Automatingcyber threat intelligence extraction from the text on pace with the changing threat
landscape: A survey”, ACM ComputingSurveys. 55(12):1-36. Available at:
https://doi.org/10.1145/3571726.
[28] CISA, “Best Practices for MITRE ATT&CK ® Mapping CHANGE RECORD.” Accessed:
(2023,Feb) . Available at: https://www.cisa.gov/uscert/best-practices-mitre-attckr-mapping.
[29] Shapna Sultana Pal, (2022) "MCDM for Selection of Cybersecurity Technologies Used in
Cybersecurity Education," Doctoral dissertation, School of Engineering and Applied Sciences,
George Washington University.
[30] S. Greco, M. Ehrgott, and J. R. Figueira, (2016) "Multiple Criteria Decision Analysis State of the
Art Surveys”, Volume, 1&2, 2nd edition, Springer.
[31] W. K. M. Brauers, E. K. Zavadskas, Z. Turskis, and T. Vilutiene,(2010) "Multiobjective
Contractor's Ranking by Applying the MOORA Method", Journal of Business Economics and
Management, vol. 9, no. 4, pp. 245-255, Available at: https://doi.org/10.3846/1611-
1699.2008.9.245-255.
[32] S. K. Dwivedi and A. Dwivedi,(2018) “Application of MOORA and WSM method for supplier
selection in manufacturing”, International Journal of Advance Research and Development
(IJARND), vol. 3, issue 7, pp. 114-117.
[33] V. Kumar, M. Anjum, V. Agarwal, and P. K. Kapur, (2023) “A Hybrid Approach for Evaluation
and Prioritization of Software Vulnerabilities,” in Springer Series in Reliability Engineering,
Springer Science and Business Media Deutschland GmbH, , pp. 39–51. doi: 10.1007/978-3-031-
05347-4_3.
[34] D. Mashima,(2022)“MITRE ATT&CK Based Evaluation on In-Network Deception
Technology for Modernized Electrical Substation Systems,” Sustainability, vol. 14, no. 3, p. 1256,
Jan., doi: 10.3390/su14031256.
[35] H. Kim and H. Kim, (2022) “Comparative Experiment on TTP Classification with Class Imbalance
Using Oversampling from CTI Dataset,” Security and Communication Networks, vol., pp. 1–11,
Oct. 2022, doi: 10.1155/2022/5021125.