[HTML][HTML] Insider threat detection in cyber-physical systems: a systematic literature review

MN Al-Mhiqani, T Alsboui, T Al-Shehari… - Computers and …, 2024 - Elsevier
The rapid expansion of cyber-physical systems (CPSs) has introduced new security
challenges, leading to the emergence of various threats, attacks, and controls aimed at …

Respite for SMEs: A systematic review of socio-technical cybersecurity metrics

M Van Haastrecht, B Yigit Ozkan, M Brinkhuis… - Applied sciences, 2021 - mdpi.com
Featured Application The results of this work will be incorporated in an application for SMEs
in Europe, which aims to improve cybersecurity awareness and resilience, as part of the EU …

Managing the Inevitable–A Maturity Model to Establish Incident Response Management Capabilities

M Bitzer, B Häckel, D Leuthe, J Ott, B Stahl… - Computers & Security, 2023 - Elsevier
Although the ongoing digital transformation offers new opportunities for organizations, more
emphasis on information security is needed due to the evolving cyber-threat landscape …

Social media zero-day attack detection using TensorFlow

AE Topcu, YI Alzoubi, E Elbasi, E Camalan - Electronics, 2023 - mdpi.com
In the current information era, knowledge can pose risks in the online realm. It is imperative
to proactively recognize potential threats, as unforeseen dangers cannot be eliminated …

Artificial intelligence (AI) cybersecurity dimensions: a comprehensive framework for understanding adversarial and offensive AI

M Malatji, A Tolah - AI and Ethics, 2024 - Springer
Abstract As Artificial Intelligence (AI) rapidly advances and integrates into various domains,
cybersecurity emerges as a critical field grappling with both the benefits and pitfalls of AI …

[HTML][HTML] Beyond Data Protection: Exploring the Convergence between Cybersecurity and Sustainable Development in Business

FI Morales-Sáenz, JM Medina-Quintero… - Sustainability, 2024 - mdpi.com
The increase in the use of information technology (IT) poses a challenge derived from the
risks and threats of computer security in all areas of society. In this sense, cybersecurity …

Intellectual structure of cybersecurity research in enterprise information systems

N Singh, V Krishnaswamy, JZ Zhang - Enterprise Information …, 2023 - Taylor & Francis
Enterprises aspire for ongoing and effective information systems security. Cybersecurity
frameworks ensure the availability, confidentiality, and integrity of information. Inspired by …

Cobit 5 Untuk Tata Kelola Audit Sistem Informasi Perpustakaan

MA Mz - Jurnal Teknoinfo, 2021 - ejurnal.teknokrat.ac.id
Tata kelola TI diperlukan untuk menjaga dan memastikan Sistem Informasi di lembaga
perpustakaan berjalan dengan baik. Hal ini berpengaruh terhadap kualitas pelayanan yang …

Analysis of insider threats in the healthcare industry: A text mining approach

I Lee - Information, 2022 - mdpi.com
To address rapidly growing data breach incidents effectively, healthcare providers need to
identify various insider and outsider threats, analyze the vulnerabilities of their internal …

[HTML][HTML] Critical Factors and Practices in Mitigating Cybercrimes within E-Government Services: A Rapid Review on Optimising Public Service Management

S Mushtaq, M Shah - Information, 2024 - mdpi.com
This review addresses the fragmented literature on administrative interventions for
cybercrime mitigation within e-government services, which often prioritise technological …