Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance …

RF Ali, PDD Dominic, SEA Ali, M Rehman, A Sohail - Applied Sciences, 2021 - mdpi.com
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …

[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

Cybersecurity risk assessment in smart city infrastructures

M Kalinin, V Krundyshev, P Zegzhda - Machines, 2021 - mdpi.com
The article is devoted to cybersecurity risk assessment of the dynamic device-to-device
networks of a smart city. Analysis of the modern security threats at the IoT/IIoT, VANET, and …

Towards a blockchain assisted patient owned system for electronic health records

T Fatokun, A Nag, S Sharma - Electronics, 2021 - mdpi.com
Security and privacy of patients' data is a major concern in the healthcare industry. In this
paper, we propose a system that activates robust security and privacy of patients' medical …

The effect of organizational information security climate on information security policy compliance: The mediating effect of social bonding towards healthcare nurses

K Dong, RF Ali, PDD Dominic, SEA Ali - Sustainability, 2021 - mdpi.com
The advancement of information communication technology in healthcare institutions has
increased information security breaches. Scholars and industry practitioners have reported …

Performance evaluation of an independent time optimized infrastructure for big data analytics that maintains symmetry

S Vats, BB Sagar, K Singh, A Ahmadian, BA Pansera - Symmetry, 2020 - mdpi.com
Traditional data analytics tools are designed to deal with the asymmetrical type of data ie,
structured, semi-structured, and unstructured. The diverse behavior of data produced by …

Enhancing malware analysis sandboxes with emulated user behavior

S Liu, P Feng, S Wang, K Sun, J Cao - Computers & Security, 2022 - Elsevier
Cybersecurity teams have widely used malware analysis sandboxes to investigate the threat
of malware. Correspondingly, armored malware adopts various anti-sandbox techniques to …

ARIES: A novel multivariate intrusion detection system for smart grid

P Radoglou Grammatikis, P Sarigiannidis… - Sensors, 2020 - mdpi.com
The advent of the Smart Grid (SG) raises severe cybersecurity risks that can lead to
devastating consequences. In this paper, we present a novel anomaly-based Intrusion …

Generating fake documents using probabilistic logic graphs

Q Han, C Molinaro, A Picariello, G Sperli… - … on Dependable and …, 2021 - ieeexplore.ieee.org
Past research has shown that over 8 months may elapse between the time when a network
is compromised and the time the attack is discovered. During this long gap, attackers can …

A survey on recent advanced research of CPS security

Z Wang, W **e, B Wang, J Tao, E Wang - Applied Sciences, 2021 - mdpi.com
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate
computing, communication, and control. Malicious attacks on CPSs can lead to both …