Cyber security threats and vulnerabilities: a systematic map** study
There has been a tremendous increase in research in the area of cyber security to support
cyber applications and to avoid key security threats faced by these applications. The goal of …
cyber applications and to avoid key security threats faced by these applications. The goal of …
Blockchain technology in logistics and supply chain management—A bibliometric literature review from 2016 to January 2020
B Müßigmann, H von der Gracht… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
As part of business and management studies, research works addressed blockchain
technology (BCT) in logistics and supply chain management (LSCM) first in 2016. Increasing …
technology (BCT) in logistics and supply chain management (LSCM) first in 2016. Increasing …
A survey on technical threat intelligence in the age of sophisticated cyber attacks
W Tounsi, H Rais - Computers & security, 2018 - Elsevier
Today's cyber attacks require a new line of security defenses. The static approach of
traditional security based on heuristic and signature does not match the dynamic nature of …
traditional security based on heuristic and signature does not match the dynamic nature of …
Uncertainty, knowledge problems, and entrepreneurial action
Whether new business ventures emerge in the context of start-ups or corporate giants, one
of the enduring and fundamental assumptions underlying theories of entrepreneurial action …
of the enduring and fundamental assumptions underlying theories of entrepreneurial action …
Software-defined networking: A comprehensive survey
The Internet has led to the creation of a digital society, where (almost) everything is
connected and is accessible from anywhere. However, despite their widespread adoption …
connected and is accessible from anywhere. However, despite their widespread adoption …
A new direction in social network analysis: Online social network analysis problems and applications
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …
of the Internet has become widespread worldwide as the technological infrastructure and the …
Applying routine activity theory to cybercrime: A theoretical and empirical analysis
The central question of this article is whether routine activity theory (RAT) can be used as an
analytical framework to study cybercrimes. Both a theoretical analysis and an analysis of …
analytical framework to study cybercrimes. Both a theoretical analysis and an analysis of …
Supply chain 4.0: A survey of cyber security challenges, solutions and future directions
Supply chain 4.0 denotes the fourth revolution of supply chain management systems,
integrating manufacturing operations with telecommunication and Information Technology …
integrating manufacturing operations with telecommunication and Information Technology …
A systematic literature review on the cyber security
In recent years, the Internet has become an integral element of people's everyday lifestyles
all across the world. Online criminality, on the other hand, has risen in tandem with the …
all across the world. Online criminality, on the other hand, has risen in tandem with the …
Future directions for behavioral information security research
Information Security (InfoSec) research is far reaching and includes many approaches to
deal with protecting and mitigating threats to the information assets and technical resources …
deal with protecting and mitigating threats to the information assets and technical resources …