Search
Search Results
-
Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation
A novel gamification system is presented in this paper, which receives data from cyber-security training platforms and federated cyber range...
-
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack
Information and Communication Technologies and Internet networks are present in all aspects of social reality and are essential elements in research,...
-
Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems
Through a quantitative study of deck officers’ cyber risk perceptions towards information (IT) and operational (OT) systems, this paper contributes...
-
A modular cyber security training programme for the maritime domain
The global maritime industry is continuing the rapid digitization of systems and dependency on advancing technology, in a trend akin to other...
-
Proposing the future skill requirements for maritime cyber security
In maritime transportation, many onboard ships operations have been digitalized. The usage and implementation of information systems has offered new...
-
Australia’s cyber security reform—an update
The 2023–2030 Australian Cyber Security Strategy aims to make Australia a world-leader in cyber security by 2030. It will, thus, be a significant...
-
A systematic literature review of mitigating cyber security risk
Increasing internet consumption and constant technological development, specifically smartphones, have led to an increasingly urgent need for cyber...
-
Cyber-Security awareness and its contribution towards sustainable human development: insights from the Zimbabwean context
Focusing on citizens’ awareness of cyber-security, this paper contributes to debates on ICTs and their contribution towards human development. The...
-
Cyber range scenario for smart grid security training
This paper discusses the development and use of a cyber range scenario for teaching cyber security in the energy sector, specifically in the smart...
-
Cyber range design framework for cyber security education and training
The need for effective training of cyber security personnel working in critical infrastructures and in the corporate has brought attention to the...
-
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges
Smart Grid (SG) technology utilizes advanced network communication and monitoring technologies to manage and regulate electricity generation and...
-
Key factors related to cyber security affecting consumer attitude in online shopping-a study in Bangladesh
This research study examines the cyber security factors that affect the consumer attitude toward online shopping, focusing on Bangladesh, a...
-
A Multi-level Reference Model and a Dedicated Method for Cyber-Security by Design
The increased reliance of organizations on information technology inherently increases their vulnerability to cyber-security attacks. As a response,...
-
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices
Spurred by the rapid modernisation of the sector and the advent of Internet Protocol Television (IPTV), audiovisual (AV) piracy is at epidemic...
-
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
The escalating complexity and impact of cyber threats require organisations to rehearse responses to cyber-attacks by routinely conducting cyber...
-
Analysis of cyber security knowledge gaps based on cyber security body of knowledge
Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security...
-
Identifying cyber security competencies and skills from online job advertisements through topic modeling
This study aims to reveal the competence areas and skill sets needed in the business world in the field of cyber security (CS). For this purpose,...
-
A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction
Understanding the current threat landscape as well as timely detection of imminent attacks are primary objectives of cyber security. Through...
-
Assessing the Security of a Cyber-Physical System Based on an Analysis of Malware Signatures
Abstract—The structure and basic properties of a generalized cyber-physical system are studied. Information security problems and basic approaches to...
-
Implementation of a novel secured authentication protocol for cyber security applications
Robust verification protocols are crucial for maintaining the security and reliability of sensitive information due to the increasing complexity of...