Assessment of security vulnerabilities in wearable devices B Cusack, B Antony, G Ward, S Mody | 23 | 2017 |
Points of failure in the ransomware electronic business model B Cusack, G Ward | 7 | 2018 |
Using Knowledge Synthesis to Identify Multi-dimensional Risk Factors in IoT Assets G Ward, L Janczewski International Conference on Advances in Cyber Security, 176-197, 2021 | 5 | 2021 |
Investigating Data Risk Considerations in Emergent Cyber Physical Production Systems G Ward, L Janczewski 13th International Multi-Conference on Complexity, Informatics and …, 2022 | 4 | 2022 |
Analysis of Identity Access Management Controls in IoT Systems G Ward, L Janczewski 2022 IEEE 7th International conference for Convergence in Technology (I2CT), 1-7, 2022 | 2 | 2022 |
IOT: Challenges in Information Security Training LJ Janczewski, G Ward KSU Proceedings on Cybersecurity Education, 2019 | 2 | 2019 |
The PISA Model: A Common Data Security Model for the Industrial Internet of Things (IIoT) Information Systems G WARD, L JANCZEWSKI | | |