[HTML][HTML] Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes

Y Shen, S Shen, Q Li, H Zhou, Z Wu, Y Qu - Digital Communications and …, 2023 - Elsevier
The fast proliferation of edge devices for the Internet of Things (IoT) has led to massive
volumes of data explosion. The generated data is collected and shared using edge-based …

Information sharing in cybersecurity: A review

A Pala, J Zhuang - Decision Analysis, 2019 - pubsonline.informs.org
In this survey, we review the cybersecurity information-sharing literature, categorizing the
identified papers based on their main focus and methodological approaches implemented to …

How Industrial Internet Platforms guide high-quality information sharing for semiconductor manufacturing? An evolutionary game model

N Feng, Y Zhang, B Ren, R Dou, M Li - Computers & Industrial Engineering, 2023 - Elsevier
To keep up with the times, the semiconductor manufacturing industry needs to break down
barriers to data transmission. Since the manufacturing process of semiconductor materials is …

[HTML][HTML] Supply chain partnership and innovation performance of manufacturing firms: Mediating effect of knowledge sharing and moderating effect of knowledge …

H Shan, D Bai, Y Li, J Shi, S Yang - Journal of Innovation & Knowledge, 2023 - Elsevier
Affected by complicated issues, such as regional conflicts, trade wars, and the COVID-19
pandemic, manufacturing firms face enormous challenges in reconstructing the global …

Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey

Y Shen, C Shepherd, CM Ahmed, S Shen, X Wu… - … Applications of Artificial …, 2024 - Elsevier
Privacy preservation of the big data generated, deposited, and communicated by smart IoT
(Internet of Things) nodes is the major challenge in IoT networks. Anonymization, encryption …

[HTML][HTML] Knowledge absorption for cyber-security: The role of human beliefs

DP David, MM Keupp, A Mermoud - Computers in Human Behavior, 2020 - Elsevier
We investigate how human beliefs are associated with the absorption of specialist
knowledge that is required to produce cyber-security. We ground our theorizing in the …

A shared cyber threat intelligence solution for smes

M Van Haastrecht, G Golpur, G Tzismadia, R Kab… - Electronics, 2021 - mdpi.com
Small-and medium-sized enterprises (SMEs) frequently experience cyberattacks, but often
do not have the means to counter these attacks. Therefore, cybersecurity researchers and …

Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments

J Dykstra, LA Gordon, MP Loeb… - Journal of …, 2023 - academic.oup.com
The primary objective of the current study is to analytically examine the economic benefits
an organization can obtain by receiving and processing cyber threat intelligence (CTI) …

Interdependency analysis in security investment against strategic attacks

M Ezhei, B Tork Ladani - Information Systems Frontiers, 2020 - Springer
Abstract Information security investment is of high importance in management of IT
infrastructure. There are many researches focused on game theoretical modeling and …

Novel trajectory data publishing method under differential privacy

X Zhao, Y Dong, D Pi - Expert Systems with Applications, 2019 - Elsevier
The existing location-based services have collected a large amount of user trajectory data,
and if these data are directly released without any processing, the user's personal privacy …