Enterprise data breach: causes, challenges, prevention, and future directions

L Cheng, F Liu, D Yao - Wiley Interdisciplinary Reviews: Data …, 2017 - Wiley Online Library
A data breach is the intentional or inadvertent exposure of confidential information to
unauthorized parties. In the digital era, data has become one of the most critical components …

A scoping review for cybersecurity in the construction industry

N Salami Pargoo, M Ilbeigi - Journal of Management in Engineering, 2023 - ascelibrary.org
The 4th industrial revolution and its inherent digitalization are changing every aspect of the
construction industry. However, these technological transformations bring new challenges …

A framework for cyber-risk insurance against ransomware: A mixed-method approach

A Mukhopadhyay, S Jain - International Journal of Information Management, 2024 - Elsevier
Hackers follow a standard cyber kill chain process and install ransomware payloads using
phishing emails on firms belonging to critical industry, resulting in huge losses in revenue …

An empirical study of text-based machine learning models for vulnerability detection

K Napier, T Bhowmik, S Wang - Empirical Software Engineering, 2023 - Springer
With an increase in complexity and severity, it is becoming harder to identify and mitigate
vulnerabilities. Although traditional tools remain useful, machine learning models are being …

Cyber third-party risk management: A comparison of non-intrusive risk scoring reports

OF Keskin, KM Caramancion, I Tatar, O Raza, U Tatar - Electronics, 2021 - mdpi.com
Cybersecurity is a concern for organizations in this era. However, strengthening the security
of an organization's internal network may not be sufficient since modern organizations …

Digging deeper into data breaches: An exploratory data analysis of hacking breaches over time

H Hammouchi, O Cherqi, G Mezzour, M Ghogho… - Procedia Computer …, 2019 - Elsevier
Data breaches represent a permanent threat to all types of organizations. Although the types
of breaches are different, the impacts are always the same. This paper focuses on analyzing …

[PDF][PDF] Construction cybersecurity and critical infrastructure protection: new horizons for Construction 4.0.

BG de Soto, A Georgescu, B Mantha, Z Turk… - J. Inf. Technol …, 2022 - researchgate.net
One of the key concepts of Construction 4.0 is cyber-physical systems. The construction
industry is increasingly creating valuable digital assets, but it is also gradually using digital …

Architectural attack propagation analysis for identifying confidentiality issues

M Walter, R Heinrich… - 2022 IEEE 19th …, 2022 - ieeexplore.ieee.org
Exchanging data between different systems enables us to build new smart services and
digitise various areas of our daily life. This digitalisation leads to more efficient usage of …

A review of recent advances, challenges, and opportunities in malicious insider threat detection using machine learning methods

FR Alzaabi, A Mehmood - IEEE Access, 2024 - ieeexplore.ieee.org
Insider threat detection has become a paramount concern in modern times where
organizations strive to safeguard their sensitive information and critical assets from …

Security certification in payment card industry: Testbeds, measurements, and recommendations

S Rahaman, G Wang, D Yao - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
The massive payment card industry (PCI) involves various entities such as merchants, issuer
banks, acquirer banks, and card brands. Ensuring security for all entities that process …