Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping review
Bring your own device (BYOD) paradigm that permits employees to come with their own
mobile devices to join the organizational network is rapidly changing the organizational …
mobile devices to join the organizational network is rapidly changing the organizational …
[HTML][HTML] A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies
K Bennouk, N Ait Aali, Y El Bouzekri El Idrissi… - … of Cybersecurity and …, 2024 - mdpi.com
The number of new vulnerabilities continues to rise significantly each year. Simultaneously,
vulnerability databases have challenges in promptly sharing new security events with …
vulnerability databases have challenges in promptly sharing new security events with …
Identifying wechat red packets and fund transfers via analyzing encrypted network traffic
F Yan, M Xu, T Qiao, T Wu, X Yang… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
WeChat is an extremely popular application in China and among the overseas Chinese
users, and two widely used features are giving of'red packet'(a Chinese customary practice …
users, and two widely used features are giving of'red packet'(a Chinese customary practice …
CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations.
Such disadvantages may be due to the absence of security configurations or the use of …
Such disadvantages may be due to the absence of security configurations or the use of …
User perceptions of the security of mobile applications
Y Elsantil - International Journal of E-Services and Mobile …, 2020 - igi-global.com
With the exponential increase in the use of mobile devices across the globe, there is a
concomitant need to understand how mobile users perceive the security of mobile …
concomitant need to understand how mobile users perceive the security of mobile …
Security, privacy and trust of user-centric solutions
With the development of pervasive and ubiquitous computing, of IoT and personal devices,
user-centric solutions will be the paradigm for most of the future applications. In this context …
user-centric solutions will be the paradigm for most of the future applications. In this context …
Security policy opt-in decisions in Bring-Your-Own-Device (BYOD)–a persuasion and cognitive elaboration perspective
ABSTRACT Bring-Your-Own-Device (BYOD) has gained increased popularity in
organizations but may engender information security concerns. To address these concerns …
organizations but may engender information security concerns. To address these concerns …
Conceptual Designs for Security interfaces in Industrial Control Systems
Industrial Control Systems (ICS), vital for managing diverse industrial processes, face
frequent security threats due to infrastructure vulnerabilities. Challenges such as multi-user …
frequent security threats due to infrastructure vulnerabilities. Challenges such as multi-user …
Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk
NAA Othman, AA Norman, LM Kiah… - … on Computer Science …, 2021 - ieeexplore.ieee.org
The use of mobile devices by employees to access organizational Information Systems (IS)
is common nowadays, and it can be seen from the trend to the formalization of Bring Your …
is common nowadays, and it can be seen from the trend to the formalization of Bring Your …
BYOD security issues and controls framework: an outcome of a systematic literature review
TO Mayayise - International Journal of Information and …, 2023 - inderscienceonline.com
Various organisations and individuals consider the bring your own device (BYOD) practice
as a flexible method for remote working. However, as cybercrime continues to surge under …
as a flexible method for remote working. However, as cybercrime continues to surge under …