The role of user behaviour in improving cyber security management

AA Moustafa, A Bello, A Maurushat - Frontiers in Psychology, 2021 - frontiersin.org
Information security has for long time been a field of study in computer science, software
engineering, and information communications technology. The term 'information security'has …

A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles

SK Khan, N Shiwakoti, P Stasinopoulos - Accident Analysis & Prevention, 2022 - Elsevier
Abstract Emerging Connected and Autonomous Vehicles (CAVs) technology have a
ubiquitous communication framework. It poses security challenges in the form of cyber …

The need for cybersecurity in industrial revolution and smart cities

A Clim, A Toma, RD Zota, R Constantinescu - Sensors, 2022 - mdpi.com
Cities have grown in development and sophistication throughout human history. Smart cities
are the current incarnation of this process, with increased complexity and social importance …

[HTML][HTML] Cybersecurity regulatory challenges for connected and automated vehicles–State-of-the-art and future directions

SK Khan, N Shiwakoti, P Stasinopoulos, M Warren - Transport policy, 2023 - Elsevier
The technological advancements of Connected and Automated Vehicles (CAVs) are
outpacing the current regulatory regime, potentially resulting in a disconnect between …

AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis

SK Shandilya, S Upadhyay, A Kumar… - Future Generation …, 2022 - Elsevier
In the current ever-changing cybersecurity scenario, active cyber defense strategies are
imperative. In this work, we present a standard testbed to measure the efficacy and efficiency …

[HTML][HTML] Cybersecurity framework for connected and automated vehicles: A modelling perspective

SK Khan, N Shiwakoti, P Stasinopoulos, Y Chen… - Transport Policy, 2025 - Elsevier
Abstract Connected and Automated Vehicles (CAVs) cybersecurity is an inherently complex,
multi-dimensional issue that goes beyond isolated hardware or software vulnerabilities …

A study of cybersecurity education using a present-test-practice-assess model

MD Workman, JA Luévanos… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Contribution: Based on a previous exploratory study, this research further investigated
learning mode contributions from simulations and live competitive activities compared to a …

Review of cybersecurity research topics, taxonomy and challenges: Interdisciplinary perspective

H Suryotrisongko, Y Musashi - 2019 IEEE 12th conference on …, 2019 - ieeexplore.ieee.org
As cybersecurity is a growing field of science, there is not complete agreement across the
scope of cybersecurity research topics. This paper proposes a grouping and classifications …

[HTML][HTML] Multi-labeling of complex, multi-behavioral malware samples

P García-Teodoro, JA Gómez-Hernández… - Computers & …, 2022 - Elsevier
The use of malware samples is usually required to test cyber security solutions. For that, the
correct typology of the samples is of interest to properly estimate the exhibited performance …

The concept of a quantum edge simulator: edge computing and sensing in the quantum era

A Passian, G Buchs, CM Seck, AM Marino, NA Peters - Sensors, 2022 - mdpi.com
Sensors, enabling observations across vast spatial, spectral, and temporal scales, are major
data generators for information technology (IT). Processing, storing, and communicating this …