Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends

AKMB Haque, B Bhushan, G Dhiman - Expert Systems, 2022 - Wiley Online Library
The emergence of smart cities and sustainable development has become a globally
accepted form of urbanization. The epitome of smart city development has become possible …

A conceptual model for cybersecurity governance

S Yusif, A Hafeez-Baig - Journal of applied security research, 2021 - Taylor & Francis
Cybersecurity is a growing problem associated with everything an individual or an
organization does that is facilitated by the Internet. It is a multi-facetted program that can be …

Systematic review analysis on SQLIA detection and prevention approaches

MS Aliero, KN Qureshi, MF Pasha, I Ghani… - Wireless Personal …, 2020 - Springer
SQL injection attack (SQLIA) is one of the most severe attacks that can be used against web
database driving applications. Attackers use SQLIA to get unauthorized access and perform …

Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage

Y Miao, Q Tong, RH Deng, KKR Choo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Searchable encryption (SE) allows cloud tenants to retrieve encrypted data while preserving
data confidentiality securely. Many SE solutions have been designed to improve efficiency …

A natural human language framework for digital forensic readiness in the public cloud

SO Baror, HS Venter, R Adeyemi - Australian Journal of Forensic …, 2021 - Taylor & Francis
Currently, about half of all global enterprises are adopting and using some form of cloud
computing services. In cloud computing, potential digital evidence is distributed across …

Threshold multi-keyword search for cloud-based group data sharing

Y Miao, RH Deng, KKR Choo, X Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Searchable Encryption (SE) is a popular cryptographic primitive for building ciphertexts
retrieval systems with far-reaching applications. However, existing SE schemes generally do …

An extended digital forensic readiness and maturity model

A Taiwo, I Claims - Forensic Science International: Digital Investigation, 2022 - Elsevier
Digital forensics readiness (DFR) is an important part of the growing forensic domain.
Research on DFR has been given little attention, while available DFR models have focused …

A defined digital forensic criteria for cybercrime reporting

SO Baror, RA Ikuesan… - … Conference on Cyber …, 2020 - search.proquest.com
In recent years a large proportion of cybercrime attacks are text-data based, whereby the
cyberattack propagation method is non-technical. Though copious information about these …

VR-PEKS: A verifiable and resistant to keyword guess attack public key encryption with keyword search scheme

Y Tang, Y Chen, Y Luo, S Dong, T Li - Applied Sciences, 2023 - mdpi.com
Public key encryption with keyword search (PEKS) allows users to perform keyword
searches of ciphertext on untrusted cloud storage servers, protecting data privacy while …

Human Factors in Cybersecurity: A Cross-Cultural Study on Trust

IY Alhasan - 2023 - hammer.purdue.edu
Human error is one of the most prominent challenges facing cybersecurity today. Attackers
manipulate people's natural inclination to make mistakes using social engineering tactics to …