Human behaviour as an aspect of cybersecurity assurance M Evans, LA Maglaras, Y He, H Janicke Security and Communication Networks 9 (17), 4667-4679, 2016 | 230 | 2016 |
Smart cities and cyber security: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership M Vitunskaite, Y He, T Brandstetter, H Janicke Computers & Security 83, 313-331, 2019 | 184 | 2019 |
Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review Y He, A Aliyu, M Evans, C Luo Journal of medical Internet research 23 (4), e21747, 2021 | 181 | 2021 |
Social internet of vehicles for smart cities LA Maglaras, AH Al-Bayatti, Y He, I Wagner, H Janicke Journal of Sensor and Actuator Networks 5 (1), 3, 2016 | 168 | 2016 |
HEART-IS: A novel technique for evaluating human error-related information security incidents M Evans, Y He, L Maglaras, H Janicke Computers & Security 80, 74-89, 2019 | 119 | 2019 |
On the security risks of the blockchain E Zamani, Y He, M Phillips Journal of Computer Information Systems 60 (6), 495-506, 2020 | 118 | 2020 |
Internet of cloud: Security and privacy issues A Cook, M Robinson, MA Ferrag, LA Maglaras, Y He, K Jones, H Janicke Cloud Computing for Optimization: Foundations, Applications, and Challenges …, 2018 | 97 | 2018 |
A holistic cybersecurity maturity assessment framework for higher education institutions in the United Kingdom A Aliyu, L Maglaras, Y He, I Yevseyeva, E Boiten, A Cook, H Janicke Applied Sciences 10 (10), 3660, 2020 | 90 | 2020 |
On recommendation of learning objects using felder-silverman learning style model SM Nafea, F Siewe, Y He IEEE Access 7, 163034-163048, 2019 | 75 | 2019 |
Game‐based learning: A review of tabletop exercises for cybersecurity incident response training GN Angafor, I Yevseyeva, Y He Security and privacy 3 (6), e126, 2020 | 69 | 2020 |
Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector M Evans, Y He, L Maglaras, I Yevseyeva, H Janicke International journal of medical informatics 127, 109-119, 2019 | 53 | 2019 |
Challenges of information security incident learning: an industrial case study in a Chinese healthcare organization Y He, C Johnson Informatics for Health and Social Care 42 (4), 393-408, 2017 | 39 | 2017 |
Bridging the cyber security skills gap: Using tabletop exercises to solve the CSSG crisis GN Angafor, I Yevseyeva, Y He Joint International Conference on Serious Games, 117-131, 2020 | 37 | 2020 |
A novel algorithm for course learning object recommendation based on student learning styles SM Nafea, F Siewe, Y He 2019 International Conference on Innovative Trends in Computer Engineering …, 2019 | 36 | 2019 |
Agile incident response (AIR): Improving the incident response process in healthcare Y He, ED Zamani, S Lloyd, C Luo International Journal of Information Management 62, 102435, 2022 | 35 | 2022 |
Generic security cases for information system security in healthcare systems Y He, CW Johnson 7th IET International Conference on System Safety, incorporating the Cyber …, 2012 | 35 | 2012 |
Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form M Evans, Y He, C Luo, I Yevseyeva, H Janicke, LA Maglaras IEEE Access 7, 102087-102101, 2019 | 32 | 2019 |
Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template Y He, C Johnson International journal of medical informatics 84 (11), 941-949, 2015 | 32 | 2015 |
CAESAR8: An agile enterprise architecture approach to managing information security risks P Loft, Y He, I Yevseyeva, I Wagner Computers & Security 122, 102877, 2022 | 28 | 2022 |
A fuzzy-logic approach to dynamic bayesian severity level classification of driver distraction using image recognition A Fasanmade, Y He, AH Al-Bayatti, JN Morden, SO Aliyu, AS Alfakeeh, ... IEEE Access 8, 95197-95207, 2020 | 26 | 2020 |