{"id":"https://openalex.org/W4414713297","doi":"https://doi.org/10.1016/j.eswa.2025.129920","title":"A hybrid FAIR and XGBoost framework for cyber-risk intelligence and expected loss prediction","display_name":"A hybrid FAIR and XGBoost framework for cyber-risk intelligence and expected loss prediction","publication_year":2025,"publication_date":"2025-10-01","ids":{"openalex":"https://openalex.org/W4414713297","doi":"https://doi.org/10.1016/j.eswa.2025.129920"},"language":"en","primary_location":{"id":"doi:10.1016/j.eswa.2025.129920","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.eswa.2025.129920","pdf_url":null,"source":{"id":"https://openalex.org/S13144211","display_name":"Expert Systems with Applications","issn_l":"0957-4174","issn":["0957-4174","1873-6793"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Expert Systems with Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.eswa.2025.129920","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056515477","display_name":"Chioma Nwafor","orcid":"https://orcid.org/0000-0001-9612-7214"},"institutions":[{"id":"https://openalex.org/I195939026","display_name":"Glasgow Caledonian University","ror":"https://ror.org/03dvm1235","country_code":"GB","type":"education","lineage":["https://openalex.org/I195939026"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Chioma Ngozi Nwafor","raw_affiliation_strings":["Glasgow School for Business and Society, Department of Finance, Accountancy and Risk, Glasgow Caledonia University, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Glasgow School for Business and Society, Department of Finance, Accountancy and Risk, Glasgow Caledonia University, London, United Kingdom","institution_ids":["https://openalex.org/I195939026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022403371","display_name":"Obumneme Nwafor","orcid":"https://orcid.org/0000-0002-0993-1659"},"institutions":[{"id":"https://openalex.org/I195939026","display_name":"Glasgow Caledonian University","ror":"https://ror.org/03dvm1235","country_code":"GB","type":"education","lineage":["https://openalex.org/I195939026"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Obumneme Nwafor","raw_affiliation_strings":["School of Computing, Engineering and Built Environment, Glasgow Caledonian University, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, Engineering and Built Environment, Glasgow Caledonian University, London, United Kingdom","institution_ids":["https://openalex.org/I195939026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030331578","display_name":"Sanjukta Brahma","orcid":"https://orcid.org/0000-0002-0372-9644"},"institutions":[{"id":"https://openalex.org/I195939026","display_name":"Glasgow Caledonian University","ror":"https://ror.org/03dvm1235","country_code":"GB","type":"education","lineage":["https://openalex.org/I195939026"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sanjukta Brahma","raw_affiliation_strings":["Glasgow School for Business and Society, Department of Finance, Accountancy and Risk, Glasgow Caledonia University, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Glasgow School for Business and Society, Department of Finance, Accountancy and Risk, Glasgow Caledonia University, London, United Kingdom","institution_ids":["https://openalex.org/I195939026"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042801216","display_name":"Mausumi Acharyya","orcid":null},"institutions":[{"id":"https://openalex.org/I195939026","display_name":"Glasgow Caledonian University","ror":"https://ror.org/03dvm1235","country_code":"GB","type":"education","lineage":["https://openalex.org/I195939026"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Madhusudan Acharyya","raw_affiliation_strings":["Glasgow Caledonia University, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Glasgow Caledonia University, London, United Kingdom","institution_ids":["https://openalex.org/I195939026"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5056515477"],"corresponding_institution_ids":["https://openalex.org/I195939026"],"apc_list":{"value":3220,"currency":"USD","value_usd":3220},"apc_paid":{"value":3220,"currency":"USD","value_usd":3220},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14474775,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"299","issue":null,"first_page":"129920","last_page":"129920"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9812999963760376,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9695000052452087,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/downtime","display_name":"Downtime","score":0.5734000205993652},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.524399995803833},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.4731999933719635},{"id":"https://openalex.org/keywords/operational-risk","display_name":"Operational risk","score":0.45980000495910645},{"id":"https://openalex.org/keywords/dashboard","display_name":"Dashboard","score":0.45239999890327454},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.41600000858306885},{"id":"https://openalex.org/keywords/maturity","display_name":"Maturity (psychological)","score":0.3815000057220459},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.37619999051094055}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7268000245094299},{"id":"https://openalex.org/C180591934","wikidata":"https://www.wikidata.org/wiki/Q1253369","display_name":"Downtime","level":2,"score":0.5734000205993652},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5496000051498413},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.524399995803833},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.4731999933719635},{"id":"https://openalex.org/C11489865","wikidata":"https://www.wikidata.org/wiki/Q944806","display_name":"Operational risk","level":3,"score":0.45980000495910645},{"id":"https://openalex.org/C33499554","wikidata":"https://www.wikidata.org/wiki/Q1417134","display_name":"Dashboard","level":2,"score":0.45239999890327454},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.41600000858306885},{"id":"https://openalex.org/C101433766","wikidata":"https://www.wikidata.org/wiki/Q3543263","display_name":"Maturity (psychological)","level":2,"score":0.3815000057220459},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.37619999051094055},{"id":"https://openalex.org/C112789634","wikidata":"https://www.wikidata.org/wiki/Q18207010","display_name":"False positives and false negatives","level":3,"score":0.3741999864578247},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.3693999946117401},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.36309999227523804},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.36010000109672546},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.36010000109672546},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.35420000553131104},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.33799999952316284},{"id":"https://openalex.org/C85890633","wikidata":"https://www.wikidata.org/wiki/Q929673","display_name":"Capability Maturity Model","level":3,"score":0.32249999046325684},{"id":"https://openalex.org/C73722673","wikidata":"https://www.wikidata.org/wiki/Q1082833","display_name":"Probabilistic risk assessment","level":3,"score":0.3095000088214874},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3019999861717224},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.2904999852180481},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27230000495910645},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.26339998841285706},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2565000057220459}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/j.eswa.2025.129920","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.eswa.2025.129920","pdf_url":null,"source":{"id":"https://openalex.org/S13144211","display_name":"Expert Systems with Applications","issn_l":"0957-4174","issn":["0957-4174","1873-6793"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Expert Systems with Applications","raw_type":"journal-article"},{"id":"pmh:oai:researchonline.gcu.ac.uk:openaire_cris_publications/16dba42a-9b66-4b09-b195-548703f29f4e","is_oa":true,"landing_page_url":"https://researchonline.gcu.ac.uk/en/publications/16dba42a-9b66-4b09-b195-548703f29f4e","pdf_url":"https://researchonline.gcu.ac.uk/ws/files/106553016/106550546.pdf","source":{"id":"https://openalex.org/S4306402566","display_name":"ResearchOnline (Glasgow Caledonian University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I195939026","host_organization_name":"Glasgow Caledonian University","host_organization_lineage":["https://openalex.org/I195939026"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Nwafor, C, Nwafor, O Z, Brahma, S & Acharyya, M 2026, 'A hybrid FAIR and XGBoost framework for cyber-risk intelligence and expected loss prediction', Expert Systems with Applications, vol. 299, no. Part A, 129920. https://doi.org/10.1016/j.eswa.2025.129920","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1016/j.eswa.2025.129920","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.eswa.2025.129920","pdf_url":null,"source":{"id":"https://openalex.org/S13144211","display_name":"Expert Systems with Applications","issn_l":"0957-4174","issn":["0957-4174","1873-6793"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Expert Systems with Applications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1964357740","https://openalex.org/W1969248194","https://openalex.org/W2001340159","https://openalex.org/W2107932715","https://openalex.org/W2119821739","https://openalex.org/W2295598076","https://openalex.org/W2516809705","https://openalex.org/W2758551931","https://openalex.org/W2769702554","https://openalex.org/W2787894218","https://openalex.org/W2897390405","https://openalex.org/W2911964244","https://openalex.org/W2969431266","https://openalex.org/W2975179473","https://openalex.org/W3033647046","https://openalex.org/W3104887532","https://openalex.org/W3207621943","https://openalex.org/W4206128287","https://openalex.org/W4322627146","https://openalex.org/W4380148728","https://openalex.org/W4386102753","https://openalex.org/W4386287167","https://openalex.org/W4386760000","https://openalex.org/W4388111012","https://openalex.org/W4388286891","https://openalex.org/W4391111057","https://openalex.org/W4403733422","https://openalex.org/W4411606834"],"related_works":[],"abstract_inverted_index":{"This":[0,167],"paper":[1],"presents":[2],"a":[3,31,49,134],"hybrid":[4],"framework":[5,139],"integrating":[6],"the":[7,117,138,170,182],"Factor":[8],"Analysis":[9],"of":[10,69,106,174],"Information":[11],"Risk":[12,33],"(FAIR)":[13],"model":[14],"with":[15,96,178],"XGBoost":[16],"and":[17,45,55,77,113,145,158,195],"SHAP":[18,108],"explainablity":[19],"for":[20,52,140],"cyber":[21,90,143],"risk":[22,53,141,156,161],"intelligence.":[23],"We":[24,132],"extend":[25],"traditional":[26],"FAIR":[27,175],"methodology":[28],"by":[29],"developing":[30],"composite":[32],"Exposure":[34],"Score":[35,115],"(RES)":[36],"that":[37,123],"unifies":[38],"frequency,":[39],"vulnerability,":[40],"control":[41,63,124],"maturity,":[42],"loss":[43],"severity,":[44],"operational":[46],"downtime":[47],"into":[48],"standardised":[50],"metric":[51],"stratification":[54],"machine":[56],"learning":[57],"analysis.":[58,85],"Our":[59],"novel":[60],"NIST":[61],"CSF-based":[62],"maturity":[64,125],"quantification":[65,187],"provides":[66,159],"objective":[67],"measures":[68],"security":[70],"effectiveness":[71,126],"using":[72],"technology":[73],"(40%),":[74],"process":[75],"(35%),":[76],"people":[78],"(25%)":[79],"weightings":[80],"derived":[81],"from":[82],"empirical":[83],"correlation":[84],"Testing":[86],"on":[87],"3000":[88],"simulated":[89],"incident":[91],"scenarios":[92],"reveals":[93],"threshold":[94],"effects,":[95],"Expected":[97],"Annual":[98],"Loss":[99,112],"exhibiting":[100],"exponential":[101],"growth":[102],"beyond":[103],"RES":[104],"values":[105],"0.4.":[107],"analysis":[109],"identifies":[110],"Primary":[111],"Technology":[114],"as":[116],"most":[118],"influential":[119],"EAL":[120],"predictors,":[121],"demonstrating":[122],"diminishes":[127],"significantly":[128],"in":[129,185],"high-exposure":[130],"environments.":[131],"deployed":[133],"Streamlit-based":[135],"dashboard":[136],"operationalising":[137],"analysts,":[142],"insurers,":[144],"governance":[146],"professionals.":[147],"The":[148],"system":[149],"processes":[150],"threat":[151],"intelligence":[152],"data,":[153],"generates":[154],"probabilistic":[155],"scenarios,":[157],"real-time":[160],"calculations":[162],"through":[163],"an":[164],"interactive":[165],"interface.":[166],"research":[168],"contributes":[169],"first":[171],"deployable":[172],"integration":[173],"quantitative":[176],"modelling":[177],"explainable":[179],"ML,":[180],"addressing":[181],"research-to-practice":[183],"gap":[184],"cyber-risk":[186],"while":[188],"supporting":[189],"regulatory":[190],"compliance":[191],"requirements":[192],"under":[193],"NIS2":[194],"SEC":[196],"cybersecurity":[197],"disclosure":[198],"mandates.":[199]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
