Integrating cybersecurity risk management into strategic management: a comprehensive literature review

F Mızrak - Research Journal of Business and Management, 2023 - dergipark.org.tr
Purpose-This literature review aims to delve into the nexus between cybersecurity risk
management and strategic management, comprehensively exploring how organizations …

Integrated cybersecurity for metaverse systems operating with artificial intelligence, blockchains, and cloud computing

P Radanliev - Frontiers in Blockchain, 2024 - frontiersin.org
In the ever-evolving realm of cybersecurity, the increasing integration of Metaverse systems
with cutting-edge technologies such as Artificial Intelligence (AI), Blockchain, and Cloud …

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

C Dhasarathan, MK Hasan, S Islam… - CAAI Transactions …, 2023 - Wiley Online Library
This research focuses on addressing the privacy issues in healthcare advancement
monitoring with the rapid establishment of the decentralised communication system in the …

A comprehensive survey of blockchain-powered cybersecurity-a survey

R Salama, F Al-Turjman, C Altrjman… - 2023 International …, 2023 - ieeexplore.ieee.org
Text mining was used to examine the academic publications on blockchain technology and
cybersecurity that were published in huge digital libraries. Automated text mining methods …

A survey of consortium blockchain and its applications

X Chen, S He, L Sun, Y Zheng, CQ Wu - Cryptography, 2024 - mdpi.com
Blockchain is a revolutionary technology that has reshaped the trust model among mutually
distrustful peers in a distributed network. While blockchain is well-known for its initial usage …

Enhancing Software Supply Chain Resilience: Strategy For Mitigating Software Supply Chain Security Risks And Ensuring Security Continuity In Development …

A Akinsola, A Akinde - arxiv preprint arxiv:2407.13785, 2024 - arxiv.org
This article delves into the strategic approaches and preventive measures necessary to
safeguard the software supply chain against evolving threats. It aims to foster an …

Digital security by design

P Radanliev - Security Journal, 2024 - Springer
This paper scrutinises the evolving digital security landscape, encompassing technological
advancements, regulatory frameworks, and industry-specific challenges. It explores the …

Meta-Fed IDS: Meta-learning and Federated learning based fog-cloud approach to detect known and zero-day cyber attacks in IoMT networks

U Zukaib, X Cui, C Zheng, D Liang, SU Din - Journal of Parallel and …, 2024 - Elsevier
Abstract The Internet of Medical Things (IoMT) is a transformative fusion of medical sensors,
equipment, and the Internet of Things, positioned to transform healthcare. However, security …

Identifying the Mutual Correlations and Evaluating the Weights of Factors and Consequences of Mobile Application Insecurity

E Zaitseva, T Hovorushchenko, O Pavlova, Y Voichur - Systems, 2023 - mdpi.com
Currently, there is a contradiction between the growing number of mobile applications in use
and the responsibility that is placed on them, on the one hand, and the imperfection of the …

Scheduling and process optimization for blockchain-enabled cloud manufacturing using dynamic selection evolutionary algorithm

Y Zhang, Y Liang, B Jia, P Wang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The blockchain-enabled cloud manufacturing is an emerging service-oriented paradigm,
and the scheduling and process optimization for blockchain-enabled cloud manufacturing …