We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 62,176 results
  1. Article

    Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation

    A novel gamification system is presented in this paper, which receives data from cyber-security training platforms and federated cyber range...

    Jason Diakoumakos, Evangelos Chaskos, ... George Lepouras in International Journal of Information Security
    07 January 2025
  2. Article
    Full access

    Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack

    Information and Communication Technologies and Internet networks are present in all aspects of social reality and are essential elements in research,...

    Joaquín Navajas-Adán, Eulàlia Badia-Gelabert, ... Rafael Mayo-García in International Journal of Information Security
    04 April 2024 Open access
  3. Article
    Full access

    Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems

    Through a quantitative study of deck officers’ cyber risk perceptions towards information (IT) and operational (OT) systems, this paper contributes...

    Marie Haugli-Sandvik, Mass Soldal Lund, Frøy Birte Bjørneseth in International Journal of Information Security
    02 February 2024 Open access
  4. Article
    Full access

    A modular cyber security training programme for the maritime domain

    The global maritime industry is continuing the rapid digitization of systems and dependency on advancing technology, in a trend akin to other...

    Aybars Oruc, Nabin Chowdhury, Vasileios Gkioulos in International Journal of Information Security
    03 January 2024 Open access
  5. Article

    Proposing the future skill requirements for maritime cyber security

    In maritime transportation, many onboard ships operations have been digitalized. The usage and implementation of information systems has offered new...

    Omer Soner, Cagatay Kandemir in Cognition, Technology & Work
    04 April 2024
  6. Article

    Australia’s cyber security reform—an update

    The 2023–2030 Australian Cyber Security Strategy aims to make Australia a world-leader in cyber security by 2030. It will, thus, be a significant...

    Dan Jerker B. Svantesson in International Cybersecurity Law Review
    08 May 2023
  7. Article

    A systematic literature review of mitigating cyber security risk

    Increasing internet consumption and constant technological development, specifically smartphones, have led to an increasingly urgent need for cyber...

    Syafila Kamarudin, Lian Tang, ... Nor Azura Adzharuddin in Quality & Quantity
    18 December 2023
  8. Article

    Cyber-Security awareness and its contribution towards sustainable human development: insights from the Zimbabwean context

    Focusing on citizens’ awareness of cyber-security, this paper contributes to debates on ICTs and their contribution towards human development. The...

    Colletor Tendeukai Chipfumbu, Theo Tsokota, Tendayi Marovah in International Cybersecurity Law Review
    29 April 2024
  9. Article

    Cyber range scenario for smart grid security training

    This paper discusses the development and use of a cyber range scenario for teaching cyber security in the energy sector, specifically in the smart...

    Tomáš Lieskovan, David Kohout, Jakub Frolka in e & i Elektrotechnik und Informationstechnik
    14 July 2023
  10. Article
    Full access

    Cyber range design framework for cyber security education and training

    The need for effective training of cyber security personnel working in critical infrastructures and in the corporate has brought attention to the...

    M. N. Katsantonis, A. Manikas, ... D. Gritzalis in International Journal of Information Security
    18 March 2023 Open access
  11. Article
    Full access

    Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges

    Smart Grid (SG) technology utilizes advanced network communication and monitoring technologies to manage and regulate electricity generation and...

    Batoul Achaal, Mehdi Adda, ... Ali Awde in Cybersecurity
    02 May 2024 Open access
  12. Article

    Key factors related to cyber security affecting consumer attitude in online shopping-a study in Bangladesh

    This research study examines the cyber security factors that affect the consumer attitude toward online shopping, focusing on Bangladesh, a...

    Mostofa Sadab, Masoud Mohammadian, Abu Barkat Ullah in International Journal of Information Technology
    26 November 2024
  13. Article
    Full access

    A Multi-level Reference Model and a Dedicated Method for Cyber-Security by Design

    The increased reliance of organizations on information technology inherently increases their vulnerability to cyber-security attacks. As a response,...

    Sybren de Kinderen, Monika Kaczmarek-Heß, Simon Hacks in Business & Information Systems Engineering
    28 October 2024 Open access
  14. Article
    Full access

    Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices

    Spurred by the rapid modernisation of the sector and the advent of Internet Protocol Television (IPTV), audiovisual (AV) piracy is at epidemic...

    Rajiv Shah, Deniz Cemiloglu, ... Vasilis Katos in International Journal of Information Security
    06 March 2024 Open access
  15. Article
    Full access

    Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle

    The escalating complexity and impact of cyber threats require organisations to rehearse responses to cyber-attacks by routinely conducting cyber...

    Alexandros Zacharis, Vasilios Katos, Constantinos Patsakis in International Journal of Information Security
    10 May 2024 Open access
  16. Article
    Full access

    Analysis of cyber security knowledge gaps based on cyber security body of knowledge

    Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security...

    Cagatay Catal, Alper Ozcan, ... Ahmet Kasif in Education and Information Technologies
    05 August 2022
  17. Article

    Identifying cyber security competencies and skills from online job advertisements through topic modeling

    This study aims to reveal the competence areas and skill sets needed in the business world in the field of cyber security (CS). For this purpose,...

    Ozcan Ozyurt, Ahmet Ayaz in Security Journal
    06 March 2024
  18. Article
    Full access

    A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction

    Understanding the current threat landscape as well as timely detection of imminent attacks are primary objectives of cyber security. Through...

    Max Landauer, Florian Skopik, ... Torsten Ullrich in International Journal of Information Security
    30 October 2024 Open access
  19. Article

    Assessing the Security of a Cyber-Physical System Based on an Analysis of Malware Signatures

    Abstract—

    The structure and basic properties of a generalized cyber-physical system are studied. Information security problems and basic approaches to...

    01 December 2023
  20. Article
    Full access

    Implementation of a novel secured authentication protocol for cyber security applications

    Robust verification protocols are crucial for maintaining the security and reliability of sensitive information due to the increasing complexity of...

    V. Suresh Kumar, Osamah Ibrahim Khalaf, ... Diaa Salama AbdElminaam in Scientific Reports
    28 October 2024 Open access
Did you find what you were looking for? Share feedback.