

{"id":3336,"date":"2023-04-20T16:12:47","date_gmt":"2023-04-20T20:12:47","guid":{"rendered":"https:\/\/sites.temple.edu\/care\/?page_id=3336"},"modified":"2026-01-20T22:56:27","modified_gmt":"2026-01-21T03:56:27","slug":"projects-using-cira","status":"publish","type":"page","link":"https:\/\/sites.temple.edu\/care\/cira\/projects-using-cira\/","title":{"rendered":"Projects using CIRA"},"content":{"rendered":"<p>These are the public-facing projects\/publications\/talks that have used the CIRA dataset. The vast majority, however, are used for internal training\/audit\/budgeting purposes.<\/p>\n<p><strong>2025<\/strong><\/p>\n<p>Schuetz, S. W., Chen, Y., Forderer, J., &amp; Ma, Y. (2025). Does ransomware make investors \u201cWannaCry\u201d? On investors\u2019 divergent reactions to ransomware hits and near misses.\u00a0<i>MIS Quarterly<\/i>,\u00a0<i>49<\/i>(3), 1153-1168.<\/p>\n<p>Roumani, Y., &amp; Roumani, Y. F. (2025). Predicting Ransomware Incidents with Time-Series Modeling.\u00a0<i>Journal of Cybersecurity and Privacy<\/i>,\u00a0<i>5<\/i>(3), 61. Access <a href=\"https:\/\/www.mdpi.com\/2624-800X\/5\/3\/61\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>Forescout Research &#8211; Vedere Labs. Access <a href=\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>Verizon&#8217;s 2025 Data Breach Investigations Report. Access site <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>SIC digital magazine, No 163. Febrero 2025, p. 42. Access full issue <a href=\"https:\/\/revistasic.es\/sic163\/revistasic163.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><a href=\"https:\/\/sites.temple.edu\/care\/files\/2025\/02\/Image.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3933\" src=\"https:\/\/sites.temple.edu\/care\/files\/2025\/02\/Image.png\" alt=\"\" width=\"635\" height=\"314\" srcset=\"https:\/\/sites.temple.edu\/care\/files\/2025\/02\/Image.png 722w, https:\/\/sites.temple.edu\/care\/files\/2025\/02\/Image-300x148.png 300w\" sizes=\"auto, (max-width: 635px) 100vw, 635px\" \/><\/a><\/p>\n<p>Uluagac, S. (2025). &#8220;Does Ransomware Make Investors \u201cWannaCry\u201d? On Investors\u2019 Divergent Reactions to Ransomware Hits and Near Misses&#8221;. <em>MIS Quarterly<\/em>.<\/p>\n<p><strong>2024<\/strong><\/p>\n<p>Sande-R\u00edos, J., Canal-S\u00e1nchez, J., Manzano-Hern\u00e1ndez, C., &amp; Pastrana, S. (2024). Threat analysis and adversarial model for Smart Grids. In <i>2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW)<\/i> (pp. 130-145). IEEE. Access <a href=\"https:\/\/spastrana.github.io\/files\/WACCO2024_SmartGrids.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>P\u00e4rn, E., Ghadiminia, N., de Soto, B. G., &amp; Oti-Sarpong, K. (2024). A Perfect Storm: Digital Twins, Cybersecurity, and General Contracting Firms.\u00a0<i>Developments in the Built Environment<\/i>, 100466. Access <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2666165924001479\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>Su, A. Y. (2024).\u00a0<i>Relationship of Cyber Threat Intelligence and Critical Infrastructure Assets on Information Technology Critical Infrastructure Attacks<\/i> (Doctoral dissertation, Walden University). Access <a href=\"https:\/\/scholarworks.waldenu.edu\/cgi\/viewcontent.cgi?article=18306&amp;context=dissertations\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>Mierzwa, S., &amp; Christov, I. (2024). Feasibility of Creating a Non-Profit and NonGovernmental Organization Cybersecurity Incident Dataset Repository Using OSINT.\u00a0<i>Cybersecurity Pedagogy and Practice Journal<\/i>,\u00a0<i>3<\/i>(2), 48. Access <a href=\"https:\/\/digitalcommons.kean.edu\/cgi\/viewcontent.cgi?article=1036&amp;context=cybersecurity\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>Government Accountability Office (2024). CRITICAL INFRASTRUCTURE PROTECTION Agencies Need to Enhance Oversight of Ransomware Practices and Assess Federal Support. Access <a href=\"https:\/\/www.gao.gov\/assets\/d24106221.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>B\u0131\u00e7akc\u0131, S., &amp; Evren, A. G. (2024). Responding cyber-attacks and managing cyber security crises in critical infrastructures: A sociotechnical perspective. In\u00a0<i>Management and Engineering of Critical Infrastructures<\/i>\u00a0(pp. 125-151). Academic Press.<\/p>\n<p><strong>2023<\/strong><\/p>\n<p>Howden Group. (2023). <em>Cyber insurance report: June 2023<\/em> (Version 4). Access <a href=\"https:\/\/www.howdengroup.com\/sites\/corporate.howdenprod.com\/files\/2023-07\/9100%20Cyber%20Report%20June%2023%20v04.pdf\" target=\"_new\" rel=\"noopener\">here<\/a>.<\/p>\n<p>Hajizada, A., &amp; Moore, T. (2023, July). On gaps in enterprise cyber attack reporting. In\u00a0<i>2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW)<\/i>\u00a0(pp. 227-231). IEEE.<\/p>\n<p>Rantos, A. &amp; Owen, B. (2023). AVEVA\u2019s Strategies to Keep Our Products &amp; Customers Secure. Access <a href=\"https:\/\/california.avevaselect.com\/media\/ASCA\/pdfs\/events\/AVEVA_Cybersecurity_Conference_Beverly_Hills\/AVEVA_Cybersecurity_Strategies_to_Keep_Customers_Secure_Alicia_and_Bryan.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>G\u00f3mez Hern\u00e1ndez, J. A., Garc\u00eda Teodoro, P., Mag\u00e1n Carri\u00f3n, R., &amp; Rodr\u00edguez G\u00f3mez, R. (2023). Crypto-ransomware: A revision of the state of the art, advances and challenges.\u00a0<i>Electronics<\/i>,\u00a0<i>12<\/i>(21), 4494.<\/p>\n<p>Jensen, J., &amp; Paine, F. (2023). Municipal cyber risk.\u00a0<i>Available at SSRN 4588006<\/i>. Access <a href=\"https:\/\/weis2023.econinfosec.org\/wp-content\/uploads\/sites\/11\/2023\/06\/weis23-jensen.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>Langenkamp, P., Verdaasdonk, W., Klaver, M., Keja, N., &amp; Brink, N. (2023). Aan de slag met het kwantificeren van cyberrisico\u2019s (Get started with quantifying cyber risks). Netherlands National Cybersecurity Center. Click here and <a href=\"https:\/\/www.ncsc.nl\/onderzoek\/documenten\/publicaties\/2023\/april\/17\/aan-de-slag-met-het-kwantificeren-van-cyberrisicos\" target=\"_blank\" rel=\"noopener\">here<\/a> for <a href=\"https:\/\/www.ncsc.nl\/binaries\/ncsc\/documenten\/publicaties\/2023\/april\/17\/aan-de-slag-met-het-kwantificeren-van-cyberrisicos\/122TNOdv_HandleidingCyberrisico%27s_V6.pdf\" target=\"_blank\" rel=\"noopener\">more<\/a> information.<\/p>\n<p>Villanueva-Miranda, I. (2023).\u00a0<i>Modeling and predicting emerging threats using disparate data<\/i>\u00a0(Doctoral dissertation, The University of Texas at El Paso).<\/p>\n<p>Saulaiman, M. N. E., Kozlovszky, M., &amp; Csilling, \u00c1. (2023, September). Side Benefits of Cybersecurity Measures an Empirical Study. In\u00a0<i>2023 IEEE 21st Jubilee International Symposium on Intelligent Systems and Informatics (SISY)<\/i>\u00a0(pp. 000581-000588). IEEE.<\/p>\n<p><strong>2022<\/strong><\/p>\n<p>Varma, G., &amp; Chauhan, R. (2022, January). Cybercriminals Strike Where It Hurts Most: SARS-Cov-2 Pandemic and its Influence on Critical Infrastructure Ransomware Attacks. In\u00a0<i>2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)<\/i> (pp. 1-7). IEEE. Click <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9721721\" target=\"_blank\" rel=\"noopener\">here<\/a> for more information.<\/p>\n<p>Villanueva-Miranda, I., &amp; Akbar, M. (2022, December). Detecting Malware Activity Using Public Search Data. In\u00a0<i>2022 IEEE International Conference on Big Data (Big Data)<\/i> (pp. 2997-3006). IEEE. Click <a href=\"https:\/\/ieeexplore.ieee.org\/document\/10020883\" target=\"_blank\" rel=\"noopener\">here<\/a> or <a href=\"https:\/\/ieeexplore.ieee.org\/iel7\/10020192\/10020156\/10020883.pdf?casa_token=7v-emuult5kAAAAA:IRemKA7weAX1sEplodZrGh8D-2g0tAhN1SkeLYNAJf3EsTvzvoYNrUBxnfTPyVVC2l6rwz53njs\" target=\"_blank\" rel=\"noopener\">here<\/a> for more information.<\/p>\n<p>Prenner, L. (2022).\u00a0<i>Security Challenges in Safety Critical Systems<\/i>\u00a0(Doctoral dissertation, University of Applied Sciences Technikum Wien).<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>These are the public-facing projects\/publications\/talks that have used the CIRA dataset. The vast majority, however, are used for internal training\/audit\/budgeting purposes. 2025 Schuetz, S. W.,&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/sites.temple.edu\/care\/cira\/projects-using-cira\/\">Continue reading<span class=\"screen-reader-text\">Projects using CIRA<\/span><\/a><\/div>\n","protected":false},"author":2224,"featured_media":0,"parent":1407,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/full-width.php","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-3336","page","type-page","status-publish","hentry","entry"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/3336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/users\/2224"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/comments?post=3336"}],"version-history":[{"count":26,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/3336\/revisions"}],"predecessor-version":[{"id":4117,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/3336\/revisions\/4117"}],"up":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/1407"}],"wp:attachment":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/media?parent=3336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}