Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping review

CI Eke, AA Norman, M Mulenga - Artificial Intelligence Review, 2023 - Springer
Bring your own device (BYOD) paradigm that permits employees to come with their own
mobile devices to join the organizational network is rapidly changing the organizational …

[HTML][HTML] A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies

K Bennouk, N Ait Aali, Y El Bouzekri El Idrissi… - … of Cybersecurity and …, 2024 - mdpi.com
The number of new vulnerabilities continues to rise significantly each year. Simultaneously,
vulnerability databases have challenges in promptly sharing new security events with …

Identifying wechat red packets and fund transfers via analyzing encrypted network traffic

F Yan, M Xu, T Qiao, T Wu, X Yang… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
WeChat is an extremely popular application in China and among the overseas Chinese
users, and two widely used features are giving of'red packet'(a Chinese customary practice …

CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines

ÁJ Varela-Vaca, R M. Gasca, R Ceballos… - Applied Sciences, 2019 - mdpi.com
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations.
Such disadvantages may be due to the absence of security configurations or the use of …

User perceptions of the security of mobile applications

Y Elsantil - International Journal of E-Services and Mobile …, 2020 - igi-global.com
With the exponential increase in the use of mobile devices across the globe, there is a
concomitant need to understand how mobile users perceive the security of mobile …

Security, privacy and trust of user-centric solutions

RN Akram, HH Chen, J Lopez, D Sauveron… - Future Generation …, 2018 - Elsevier
With the development of pervasive and ubiquitous computing, of IoT and personal devices,
user-centric solutions will be the paradigm for most of the future applications. In this context …

Security policy opt-in decisions in Bring-Your-Own-Device (BYOD)–a persuasion and cognitive elaboration perspective

X Yang, X Wang, WT Yue, CL Sia… - Journal of Organizational …, 2019 - Taylor & Francis
ABSTRACT Bring-Your-Own-Device (BYOD) has gained increased popularity in
organizations but may engender information security concerns. To address these concerns …

Conceptual Designs for Security interfaces in Industrial Control Systems

K Li, A Roudaut, A Rashid - Companion Publication of the 2024 ACM …, 2024 - dl.acm.org
Industrial Control Systems (ICS), vital for managing diverse industrial processes, face
frequent security threats due to infrastructure vulnerabilities. Challenges such as multi-user …

Systematic Literature Review on Organizational Cyber Security Deficiency in Mitigating Mobile Device Risk

NAA Othman, AA Norman, LM Kiah… - … on Computer Science …, 2021 - ieeexplore.ieee.org
The use of mobile devices by employees to access organizational Information Systems (IS)
is common nowadays, and it can be seen from the trend to the formalization of Bring Your …

BYOD security issues and controls framework: an outcome of a systematic literature review

TO Mayayise - International Journal of Information and …, 2023 - inderscienceonline.com
Various organisations and individuals consider the bring your own device (BYOD) practice
as a flexible method for remote working. However, as cybercrime continues to surge under …