Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance …
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …
[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
Cybersecurity risk assessment in smart city infrastructures
The article is devoted to cybersecurity risk assessment of the dynamic device-to-device
networks of a smart city. Analysis of the modern security threats at the IoT/IIoT, VANET, and …
networks of a smart city. Analysis of the modern security threats at the IoT/IIoT, VANET, and …
Towards a blockchain assisted patient owned system for electronic health records
Security and privacy of patients' data is a major concern in the healthcare industry. In this
paper, we propose a system that activates robust security and privacy of patients' medical …
paper, we propose a system that activates robust security and privacy of patients' medical …
The effect of organizational information security climate on information security policy compliance: The mediating effect of social bonding towards healthcare nurses
The advancement of information communication technology in healthcare institutions has
increased information security breaches. Scholars and industry practitioners have reported …
increased information security breaches. Scholars and industry practitioners have reported …
Performance evaluation of an independent time optimized infrastructure for big data analytics that maintains symmetry
Traditional data analytics tools are designed to deal with the asymmetrical type of data ie,
structured, semi-structured, and unstructured. The diverse behavior of data produced by …
structured, semi-structured, and unstructured. The diverse behavior of data produced by …
Enhancing malware analysis sandboxes with emulated user behavior
Cybersecurity teams have widely used malware analysis sandboxes to investigate the threat
of malware. Correspondingly, armored malware adopts various anti-sandbox techniques to …
of malware. Correspondingly, armored malware adopts various anti-sandbox techniques to …
ARIES: A novel multivariate intrusion detection system for smart grid
P Radoglou Grammatikis, P Sarigiannidis… - Sensors, 2020 - mdpi.com
The advent of the Smart Grid (SG) raises severe cybersecurity risks that can lead to
devastating consequences. In this paper, we present a novel anomaly-based Intrusion …
devastating consequences. In this paper, we present a novel anomaly-based Intrusion …
Generating fake documents using probabilistic logic graphs
Past research has shown that over 8 months may elapse between the time when a network
is compromised and the time the attack is discovered. During this long gap, attackers can …
is compromised and the time the attack is discovered. During this long gap, attackers can …
A survey on recent advanced research of CPS security
Z Wang, W **e, B Wang, J Tao, E Wang - Applied Sciences, 2021 - mdpi.com
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate
computing, communication, and control. Malicious attacks on CPSs can lead to both …
computing, communication, and control. Malicious attacks on CPSs can lead to both …