The role of user behaviour in improving cyber security management
Information security has for long time been a field of study in computer science, software
engineering, and information communications technology. The term 'information security'has …
engineering, and information communications technology. The term 'information security'has …
A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles
Abstract Emerging Connected and Autonomous Vehicles (CAVs) technology have a
ubiquitous communication framework. It poses security challenges in the form of cyber …
ubiquitous communication framework. It poses security challenges in the form of cyber …
The need for cybersecurity in industrial revolution and smart cities
Cities have grown in development and sophistication throughout human history. Smart cities
are the current incarnation of this process, with increased complexity and social importance …
are the current incarnation of this process, with increased complexity and social importance …
[HTML][HTML] Cybersecurity regulatory challenges for connected and automated vehicles–State-of-the-art and future directions
The technological advancements of Connected and Automated Vehicles (CAVs) are
outpacing the current regulatory regime, potentially resulting in a disconnect between …
outpacing the current regulatory regime, potentially resulting in a disconnect between …
AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis
SK Shandilya, S Upadhyay, A Kumar… - Future Generation …, 2022 - Elsevier
In the current ever-changing cybersecurity scenario, active cyber defense strategies are
imperative. In this work, we present a standard testbed to measure the efficacy and efficiency …
imperative. In this work, we present a standard testbed to measure the efficacy and efficiency …
[HTML][HTML] Cybersecurity framework for connected and automated vehicles: A modelling perspective
Abstract Connected and Automated Vehicles (CAVs) cybersecurity is an inherently complex,
multi-dimensional issue that goes beyond isolated hardware or software vulnerabilities …
multi-dimensional issue that goes beyond isolated hardware or software vulnerabilities …
A study of cybersecurity education using a present-test-practice-assess model
MD Workman, JA Luévanos… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Contribution: Based on a previous exploratory study, this research further investigated
learning mode contributions from simulations and live competitive activities compared to a …
learning mode contributions from simulations and live competitive activities compared to a …
Review of cybersecurity research topics, taxonomy and challenges: Interdisciplinary perspective
H Suryotrisongko, Y Musashi - 2019 IEEE 12th conference on …, 2019 - ieeexplore.ieee.org
As cybersecurity is a growing field of science, there is not complete agreement across the
scope of cybersecurity research topics. This paper proposes a grouping and classifications …
scope of cybersecurity research topics. This paper proposes a grouping and classifications …
[HTML][HTML] Multi-labeling of complex, multi-behavioral malware samples
P García-Teodoro, JA Gómez-Hernández… - Computers & …, 2022 - Elsevier
The use of malware samples is usually required to test cyber security solutions. For that, the
correct typology of the samples is of interest to properly estimate the exhibited performance …
correct typology of the samples is of interest to properly estimate the exhibited performance …
The concept of a quantum edge simulator: edge computing and sensing in the quantum era
Sensors, enabling observations across vast spatial, spectral, and temporal scales, are major
data generators for information technology (IT). Processing, storing, and communicating this …
data generators for information technology (IT). Processing, storing, and communicating this …