[HTML][HTML] Internet of things and ransomware: Evolution, mitigation and prevention

M Humayun, NZ Jhanjhi, A Alsayat… - Egyptian Informatics …, 2021 - Elsevier
Internet of things architecture is the integration of real-world objects and places with the
internet. This booming in technology is bringing ease in our lifestyle and making formerly …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

Internet of Things: Evolution and technologies from a security perspective

R Ande, B Adebisi, M Hammoudeh, J Saleem - Sustainable Cities and …, 2020 - Elsevier
In recent years, IoT has developed into many areas of life including smart homes, smart
cities, agriculture, offices, and workplaces. Everyday physical items such as lights, locks and …

[HTML][HTML] Security threats to critical infrastructure: the human factor

I Ghafir, J Saleem, M Hammoudeh, H Faour… - The Journal of …, 2018 - Springer
In the twenty-first century, globalisation made corporate boundaries invisible and difficult to
manage. This new macroeconomic transformation caused by globalisation introduced new …

Cybersecurity Issues and Challenges for E-Government During COVID-19: A Review

IA Shah - Cybersecurity Measures for E-Government …, 2022 - igi-global.com
Cyber-attacks can steal information by applying different methods and activities of cyber
criminals, thereby destroying data, computer programs, and networking on one or more …

A dynamic simulation approach to support the evaluation of cyber risks and security investments in SMEs

S Armenia, M Angelini, F Nonino, G Palombi… - Decision Support …, 2021 - Elsevier
The growing amount of cyberspace threats highlights the need to evaluate cybersecurity
risks and to plan for effective investments. One internationally recognized document for …

[HTML][HTML] Information security and cybersecurity management: A case study with SMEs in Portugal

M Antunes, M Maximiano, R Gomes… - Journal of Cybersecurity …, 2021 - mdpi.com
Information security plays a key role in enterprises management, as it deals with the
confidentiality, privacy, integrity, and availability of one of their most valuable resources: data …

[HTML][HTML] LCCI: A framework for least cybersecurity controls to be implemented for small and medium enterprises (SMEs)

S Pawar, H Palivela - … Journal of Information Management Data Insights, 2022 - Elsevier
Abstract Globally Small and Medium Enterprises (SMEs) are the biggest contributors to the
economy by providing two-thirds of global employment opportunities and more than half the …

IoT standardisation: Challenges, perspectives and solution

J Saleem, M Hammoudeh, U Raza, B Adebisi… - Proceedings of the 2nd …, 2018 - dl.acm.org
The success and widespread adoption of the Internet of Things (IoT) has increased many
folds over the last few years. Industries, technologists and home users recognise the …

It won't happen to me: surveying SME attitudes to cyber-security

M Wilson, S McDonald, D Button… - Journal of Computer …, 2023 - Taylor & Francis
We report an online survey of 85 UK-based SMEs that explored their threat and coping
appraisals toward five common types of cyber-attack: Network being hacked; Data being …