Privacy preservation of electronic health records in the modern era: A systematic survey

R Nowrozy, K Ahmed, ASM Kayes, H Wang… - ACM Computing …, 2024 - dl.acm.org
Building a secure and privacy-preserving health data sharing framework is a topic of great
interest in the healthcare sector, but its success is subject to ensuring the privacy of user …

Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

[HTML][HTML] Cryptographic ransomware encryption detection: Survey

K Begovic, A Al-Ali, Q Malluhi - Computers & Security, 2023 - Elsevier
The ransomware threat has loomed over our digital life since 1989. Criminals use this type
of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts …

Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments

L Fernandez Maimo, A Huertas Celdran… - Sensors, 2019 - mdpi.com
Medical Cyber-Physical Systems (MCPS) hold the promise of reducing human errors and
optimizing healthcare by delivering new ways to monitor, diagnose and treat patients …

A quantitative bow-tie cyber risk classification and assessment framework

B Sheehan, F Murphy, AN Kia, R Kiely - Journal of Risk Research, 2021 - Taylor & Francis
Cyber-attacks pose a growing threat to global commerce that is increasingly reliant on digital
technology to conduct business. Traditional risk assessment and underwriting practices face …

[HTML][HTML] Evaluation of live forensic techniques, towards Salsa20-Based cryptographic ransomware mitigation

LF de Loaysa Babiano, R Macfarlane… - Forensic Science …, 2023 - Elsevier
Ransomware has been established as one of the largest current threats to organisations,
small businesses, governments, and individuals alike. The appearance of cryptocurrencies …

Sdn-based detection of self-propagating ransomware: the case of badrabbit

FM Alotaibi, VG Vassilakis - Ieee Access, 2021 - ieeexplore.ieee.org
In the last decade, many ransomware attacks had the ability to spread within local networks
or even outside them. At the same time, software defined networking (SDN) has provided a …

Trends and challenges in research into the human aspects of ransomware: a systematic map** study

G Murray, M Falkeling, S Gao - Information & Computer Security, 2024 - emerald.com
Purpose The purpose of this paper is to provide an overview of the trends and challenges
relating to research into the human aspects of ransomware. Design/methodology/approach …

Cybersecurity concerns under COVID-19: representations on increasing digital literacy in higher education

J Lourenço, JC Morais, S Sá, N Neves… - Perspectives and Trends …, 2023 - Springer
The COVID-19 brought several new challenges for the students and lecturers, particularly in
higher education. The conventional physical classroom was almost instantly pushed into a …

Anomaly-based intrusion detection using tree augmented naive bayes

P Wester, F Heiding… - 2021 IEEE 25th …, 2021 - ieeexplore.ieee.org
Information technology is continuously becoming a more central part of society and together
with the increased connectivity and inter-dependency of devices, it is becoming more …