Search
Search Results
-
Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation
A novel gamification system is presented in this paper, which receives data from cyber-security training platforms and federated cyber range...
-
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack
Information and Communication Technologies and Internet networks are present in all aspects of social reality and are essential elements in research,...
-
Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems
Through a quantitative study of deck officers’ cyber risk perceptions towards information (IT) and operational (OT) systems, this paper contributes...
-
Proposing the future skill requirements for maritime cyber security
In maritime transportation, many onboard ships operations have been digitalized. The usage and implementation of information systems has offered new...
-
A modular cyber security training programme for the maritime domain
The global maritime industry is continuing the rapid digitization of systems and dependency on advancing technology, in a trend akin to other...
-
Australia’s cyber security reform—an update
The 2023–2030 Australian Cyber Security Strategy aims to make Australia a world-leader in cyber security by 2030. It will, thus, be a significant...
-
Cyber-Security awareness and its contribution towards sustainable human development: insights from the Zimbabwean context
Focusing on citizens’ awareness of cyber-security, this paper contributes to debates on ICTs and their contribution towards human development. The...
-
Cyber range design framework for cyber security education and training
The need for effective training of cyber security personnel working in critical infrastructures and in the corporate has brought attention to the...
-
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges
Smart Grid (SG) technology utilizes advanced network communication and monitoring technologies to manage and regulate electricity generation and...
-
Key factors related to cyber security affecting consumer attitude in online shopping-a study in Bangladesh
This research study examines the cyber security factors that affect the consumer attitude toward online shopping, focusing on Bangladesh, a...
-
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices
Spurred by the rapid modernisation of the sector and the advent of Internet Protocol Television (IPTV), audiovisual (AV) piracy is at epidemic...
-
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
The escalating complexity and impact of cyber threats require organisations to rehearse responses to cyber-attacks by routinely conducting cyber...
-
Analysis of cyber security knowledge gaps based on cyber security body of knowledge
Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security...
-
A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction
Understanding the current threat landscape as well as timely detection of imminent attacks are primary objectives of cyber security. Through...
-
Assessing the Security of a Cyber-Physical System Based on an Analysis of Malware Signatures
Abstract—The structure and basic properties of a generalized cyber-physical system are studied. Information security problems and basic approaches to...
-
AI hype as a cyber security risk: the moral responsibility of implementing generative AI in business
This paper examines the ethical obligations companies have when implementing generative Artificial Intelligence (AI). We point to the potential cyber...
-
The LeWiS Method: Target Variable Estimation Using Cyber Security Intelligence
Information technology plays an increasingly important role in the provision of essential services. For these systems and networks to be reliable and...
-
DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT
The advancement of 5G technology has enabled the IIoT (Industrial Internet of Things) to integrate artificial intelligence, cloud computing, and edge...
-
A Comprehensive Review on Deep Learning Techniques on Cyber Attacks on Cyber Physical Systems
Cyber-Physical Systems (CPSs), which integrate control, computing, and communication, are considered as next-generation intelligent systems.A major...
-
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns
Cyber security threats, including risks to remote workers, are varied and diverse, with the number of scams and business email compromise breaches...