Review of cybersecurity assessment methods: Applicability perspective

R Leszczyna - Computers & Security, 2021 - Elsevier
Cybersecurity assessments are crucial in building the assurance that vital cyberassets are
effectively protected from threats. Multiple assessment methods have been proposed during …

Applications of artificial intelligence algorithms in the energy sector

H Szczepaniuk, EK Szczepaniuk - Energies, 2022 - mdpi.com
The digital transformation of the energy sector toward the Smart Grid paradigm, intelligent
energy management, and distributed energy integration poses new requirements for …

Systematic map** study on security approaches in secure software engineering

RA Khan, SU Khan, HU Khan, M Ilyas - Ieee Access, 2021 - ieeexplore.ieee.org
In the modern digital era, software systems are extensively adapted and have become an
integral component of human society. Such wide use of software systems consists of large …

Systematic literature review on security risks and its practices in secure software development

RA Khan, SU Khan, HU Khan, M Ilyas - ieee Access, 2022 - ieeexplore.ieee.org
Security is one of the most critical aspects of software quality. Software security refers to the
process of creating and develo** software that assures the integrity, confidentiality, and …

[HTML][HTML] Information security policies compliance in a global setting: An employee's perspective

MN Alraja, UJ Butt, M Abbod - Computers & Security, 2023 - Elsevier
Abstract Information security threats have a severe negative impact on enterprises.
Organizations rely on employee compliance with information security policies to eliminate or …

[HTML][HTML] Balancing software and training requirements for information security

D Fujs, S Vrhovec, D Vavpotič - Computers & security, 2023 - Elsevier
Abstract Information security is one of the key areas of consideration to assure reliable and
dependable information systems (IS). Achieving an appropriate level of IS security requires …

Neutrosophic MCDM Methodology for Assessment Risks of Cyber Security in Power Management

AM AbdelMouty, A Abdel-Monem - Neutrosophic Systems with …, 2023 - sciencesforce.com
Every day, new reports of cyberattacks on interconnected control systems emerge. The
vulnerability of their communication mechanism makes similar control systems a target for …

A real-world information security performance assessment using a multidimensional socio-technical approach

K Prislan, A Mihelič, I Bernik - PloS one, 2020 - journals.plos.org
Measuring the performance of information security is an essential part of the information
security management system within organisations. Studies in the past mainly focused on …

Understanding strategies for digital government transformation: A strategic action fields perspective

Y Gong, X Yang - International Journal of Information Management, 2024 - Elsevier
Digital technologies are transforming public service provision by affecting governments,
technology vendors, and citizens, as well as their interactions. However, digital government …

A Systematic Review on Image Data Protection Methods

FA Alyaqobi, NAB Yahaya - … Journal of Informatics and Information Systems, 2022 - ijiis.org
Securing data is the main goal of any data security system (DSS). Valuable data must be
protected all the time and stored in a very highly secure data storage device. This need has …