{"id":2043,"date":"2025-05-01T20:58:57","date_gmt":"2025-05-02T00:58:57","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?p=2043"},"modified":"2026-01-26T10:41:49","modified_gmt":"2026-01-26T15:41:49","slug":"new-publication-a-tool-for-enabling-scalable-automation-in-security-control-selection","status":"publish","type":"post","link":"https:\/\/carleton.ca\/cybersea\/2025\/new-publication-a-tool-for-enabling-scalable-automation-in-security-control-selection\/","title":{"rendered":"New Publication: A Tool for Enabling Scalable Automation in Security Control Selection"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        New Publication: A Tool for Enabling Scalable Automation in Security Control Selection\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<p>Another of our recent papers &#8220;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-87499-4_13\">A Tool for Enabling Scalable Automation in Security Control Selection<\/a>&#8221; is now available online. In this work, we create a tool that enables scalable automation for control selection approaches. The tool is based on a previously proposed game-theoretic approach, but could be modified to support any other control selection approach. Scalability is achieved by the development of a novel algorithm that finds suggested security control combinations for a system while considering control dependencies and budgetary constraints. As the problem addressed by the algorithm is a variation of the bounded 0\u20131 knapsack problem with dependencies between items, we prove the functionality of the algorithm and demonstrate that it has computational complexity O(n) in special cases. This paper was presented at&nbsp;the <a href=\"https:\/\/fps-2024.hec.ca\">17th International Symposium on Foundations &amp; Practice of Security (FPS 2024).<\/a>. See <a href=\"https:\/\/carleton.ca\/cybersea\/publications\/\">Publications<\/a> for more details!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another of our recent papers &#8220;A Tool for Enabling Scalable Automation in Security Control Selection&#8221; is now available online. In this work, we create a tool that enables scalable automation for control selection approaches. The tool is based on a previously proposed game-theoretic approach, but could be modified to support any other control selection approach. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[],"class_list":["post-2043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/2043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=2043"}],"version-history":[{"count":1,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/2043\/revisions"}],"predecessor-version":[{"id":2045,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/2043\/revisions\/2045"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media\/431"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=2043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/categories?post=2043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/tags?post=2043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}