Review of cybersecurity assessment methods: Applicability perspective
R Leszczyna - Computers & Security, 2021 - Elsevier
Cybersecurity assessments are crucial in building the assurance that vital cyberassets are
effectively protected from threats. Multiple assessment methods have been proposed during …
effectively protected from threats. Multiple assessment methods have been proposed during …
Applications of artificial intelligence algorithms in the energy sector
H Szczepaniuk, EK Szczepaniuk - Energies, 2022 - mdpi.com
The digital transformation of the energy sector toward the Smart Grid paradigm, intelligent
energy management, and distributed energy integration poses new requirements for …
energy management, and distributed energy integration poses new requirements for …
Systematic map** study on security approaches in secure software engineering
In the modern digital era, software systems are extensively adapted and have become an
integral component of human society. Such wide use of software systems consists of large …
integral component of human society. Such wide use of software systems consists of large …
Systematic literature review on security risks and its practices in secure software development
Security is one of the most critical aspects of software quality. Software security refers to the
process of creating and develo** software that assures the integrity, confidentiality, and …
process of creating and develo** software that assures the integrity, confidentiality, and …
[HTML][HTML] Information security policies compliance in a global setting: An employee's perspective
Abstract Information security threats have a severe negative impact on enterprises.
Organizations rely on employee compliance with information security policies to eliminate or …
Organizations rely on employee compliance with information security policies to eliminate or …
[HTML][HTML] Balancing software and training requirements for information security
Abstract Information security is one of the key areas of consideration to assure reliable and
dependable information systems (IS). Achieving an appropriate level of IS security requires …
dependable information systems (IS). Achieving an appropriate level of IS security requires …
Neutrosophic MCDM Methodology for Assessment Risks of Cyber Security in Power Management
Every day, new reports of cyberattacks on interconnected control systems emerge. The
vulnerability of their communication mechanism makes similar control systems a target for …
vulnerability of their communication mechanism makes similar control systems a target for …
A real-world information security performance assessment using a multidimensional socio-technical approach
Measuring the performance of information security is an essential part of the information
security management system within organisations. Studies in the past mainly focused on …
security management system within organisations. Studies in the past mainly focused on …
Understanding strategies for digital government transformation: A strategic action fields perspective
Y Gong, X Yang - International Journal of Information Management, 2024 - Elsevier
Digital technologies are transforming public service provision by affecting governments,
technology vendors, and citizens, as well as their interactions. However, digital government …
technology vendors, and citizens, as well as their interactions. However, digital government …
A Systematic Review on Image Data Protection Methods
FA Alyaqobi, NAB Yahaya - … Journal of Informatics and Information Systems, 2022 - ijiis.org
Securing data is the main goal of any data security system (DSS). Valuable data must be
protected all the time and stored in a very highly secure data storage device. This need has …
protected all the time and stored in a very highly secure data storage device. This need has …