We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 22,181 results
  1. Article

    Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation

    A novel gamification system is presented in this paper, which receives data from cyber-security training platforms and federated cyber range...

    Jason Diakoumakos, Evangelos Chaskos, ... George Lepouras in International Journal of Information Security
    07 January 2025
  2. Article
    Full access

    Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack

    Information and Communication Technologies and Internet networks are present in all aspects of social reality and are essential elements in research,...

    Joaquín Navajas-Adán, Eulàlia Badia-Gelabert, ... Rafael Mayo-García in International Journal of Information Security
    04 April 2024 Open access
  3. Article
    Full access

    Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems

    Through a quantitative study of deck officers’ cyber risk perceptions towards information (IT) and operational (OT) systems, this paper contributes...

    Marie Haugli-Sandvik, Mass Soldal Lund, Frøy Birte Bjørneseth in International Journal of Information Security
    02 February 2024 Open access
  4. Article

    Proposing the future skill requirements for maritime cyber security

    In maritime transportation, many onboard ships operations have been digitalized. The usage and implementation of information systems has offered new...

    Omer Soner, Cagatay Kandemir in Cognition, Technology & Work
    04 April 2024
  5. Article
    Full access

    A modular cyber security training programme for the maritime domain

    The global maritime industry is continuing the rapid digitization of systems and dependency on advancing technology, in a trend akin to other...

    Aybars Oruc, Nabin Chowdhury, Vasileios Gkioulos in International Journal of Information Security
    03 January 2024 Open access
  6. Article

    Australia’s cyber security reform—an update

    The 2023–2030 Australian Cyber Security Strategy aims to make Australia a world-leader in cyber security by 2030. It will, thus, be a significant...

    Dan Jerker B. Svantesson in International Cybersecurity Law Review
    08 May 2023
  7. Article

    Cyber-Security awareness and its contribution towards sustainable human development: insights from the Zimbabwean context

    Focusing on citizens’ awareness of cyber-security, this paper contributes to debates on ICTs and their contribution towards human development. The...

    Colletor Tendeukai Chipfumbu, Theo Tsokota, Tendayi Marovah in International Cybersecurity Law Review
    29 April 2024
  8. Article
    Full access

    Cyber range design framework for cyber security education and training

    The need for effective training of cyber security personnel working in critical infrastructures and in the corporate has brought attention to the...

    M. N. Katsantonis, A. Manikas, ... D. Gritzalis in International Journal of Information Security
    18 March 2023 Open access
  9. Article
    Full access

    Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges

    Smart Grid (SG) technology utilizes advanced network communication and monitoring technologies to manage and regulate electricity generation and...

    Batoul Achaal, Mehdi Adda, ... Ali Awde in Cybersecurity
    02 May 2024 Open access
  10. Article

    Key factors related to cyber security affecting consumer attitude in online shopping-a study in Bangladesh

    This research study examines the cyber security factors that affect the consumer attitude toward online shopping, focusing on Bangladesh, a...

    Mostofa Sadab, Masoud Mohammadian, Abu Barkat Ullah in International Journal of Information Technology
    26 November 2024
  11. Article
    Full access

    Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices

    Spurred by the rapid modernisation of the sector and the advent of Internet Protocol Television (IPTV), audiovisual (AV) piracy is at epidemic...

    Rajiv Shah, Deniz Cemiloglu, ... Vasilis Katos in International Journal of Information Security
    06 March 2024 Open access
  12. Article
    Full access

    Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle

    The escalating complexity and impact of cyber threats require organisations to rehearse responses to cyber-attacks by routinely conducting cyber...

    Alexandros Zacharis, Vasilios Katos, Constantinos Patsakis in International Journal of Information Security
    10 May 2024 Open access
  13. Article
    Full access

    Analysis of cyber security knowledge gaps based on cyber security body of knowledge

    Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security...

    Cagatay Catal, Alper Ozcan, ... Ahmet Kasif in Education and Information Technologies
    05 August 2022
  14. Article
    Full access

    A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction

    Understanding the current threat landscape as well as timely detection of imminent attacks are primary objectives of cyber security. Through...

    Max Landauer, Florian Skopik, ... Torsten Ullrich in International Journal of Information Security
    30 October 2024 Open access
  15. Article

    Assessing the Security of a Cyber-Physical System Based on an Analysis of Malware Signatures

    Abstract—

    The structure and basic properties of a generalized cyber-physical system are studied. Information security problems and basic approaches to...

    01 December 2023
  16. Article
    Full access

    AI hype as a cyber security risk: the moral responsibility of implementing generative AI in business

    This paper examines the ethical obligations companies have when implementing generative Artificial Intelligence (AI). We point to the potential cyber...

    Declan Humphreys, Abigail Koay, ... Erica Mealy in AI and Ethics
    23 February 2024 Open access
  17. Article

    The LeWiS Method: Target Variable Estimation Using Cyber Security Intelligence

    Information technology plays an increasingly important role in the provision of essential services. For these systems and networks to be reliable and...

    Leigh Chase, Alaa Mohasseb, Benjamin Aziz in SN Computer Science
    18 April 2024
  18. Article

    DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT

    The advancement of 5G technology has enabled the IIoT (Industrial Internet of Things) to integrate artificial intelligence, cloud computing, and edge...

    Anjali Rajak, Rakesh Tripathi in International Journal of Information Technology
    18 December 2023
  19. Article

    A Comprehensive Review on Deep Learning Techniques on Cyber Attacks on Cyber Physical Systems

    Cyber-Physical Systems (CPSs), which integrate control, computing, and communication, are considered as next-generation intelligent systems.A major...

    Maloth Sagar, C. Vanmathi in SN Computer Science
    20 September 2024
  20. Article

    Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns

    Cyber security threats, including risks to remote workers, are varied and diverse, with the number of scams and business email compromise breaches...

    Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros Maglaras in International Journal of Information Security
    29 January 2024
Did you find what you were looking for? Share feedback.