First Cited
Last Cited

Articles citing This Document (Page 1 of 2)

The Security and Privacy Protection Framework for Wearable DevicesLecture Notes in Computer Science2022
Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK FrameworkLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering2022
LCCI: A framework for least cybersecurity controls to be implemented for small and medium enterprises (SMEs)International Journal of Information Management Data Insights2022
Information System Security Risk Priority Number: A New Method for Evaluating and Prioritization Security Risk in Information System Applying FMEALecture Notes in Networks and Systems2022
Dimensions of cybersecurity performance and crisis response in critical infrastructure organisations: an intellectual capital perspectiveJournal of Intellectual Capital2021
A Design for Software Management Architecture and Software Management Information System in Time of Open SourceLecture Notes on Data Engineering and Communications Technologies2022
Saving Lives in a Health Crisis Through the National Cyber Threat Prevention Mechanism Case COVID-19Computational Methods in Applied Sciences (Springer)2022
Digital Security – Wie Unternehmen den Sicherheitsrisiken des digitalen Wandels trotzen2022
An integrated cyber security risk management framework and risk predication for the critical infrastructure protectionNeural Computing and Applications
Informationssicherheit im Internet der Dinge2021
Raising Awareness about Cloud Security in Industry through a Board GameInformation (Switzerland)2021
A System to Calculate Cyber-Value-at-RiskComputers and Security2021
Health Systems Security2020
Security Framework for Supply-Chain ManagementAdvances in Logistics, Operations, and Management Science Book Series2020
Towards the Insurance of Healthcare SystemsLecture Notes in Computer Science2020
Herausforderung Datenschutz und Datensicherheit in der Cloud2020
Japan’s Cybersecurity PolicyAdvances in Information and Communication Research2020
CySec: Cybersecurity Review Program for Professionals in JapanAdvances in Intelligent Systems and Computing2021
Digital Security – Wie Unternehmen den Sicherheitsrisiken des digitalen Wandels trotzen2020
Privacy Implication and Technical Requirements Toward GDPR ComplianceAdvances in Intelligent Systems and Computing2020
KIET Framework for Cloud Adoption2019
Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEsCommunications in Computer and Information Science2019
Defining a New Composite Cybersecurity Rating Scheme for SMEs in the U.K.Lecture Notes in Computer Science2019
Extension of ISO/IEC27001 to Mobile Devices Security ManagementCommunications in Computer and Information Science2019
Promoting Cybersecurity ComplianceAdvances in Information Security, Privacy, and Ethics Book Series2019
Why One Should Learn Ethical Hacking2019
Anwendungsfälle für LoRaWAN2019
A Markov Model of IoT System Availability Considering DDoS Attacks, Patching and Energy ModesStudies in Systems, Decision and Control2019
Digital Security – Wie Unternehmen den Sicherheitsrisiken des digitalen Wandels trotzen2018
Information Security ManagementAdvances in Information Security, Privacy, and Ethics Book Series2018
Building an IoT Ecosystem Framework2017
Security Framework for Supply-Chain Management2022
Automotive Intelligence Embedded in Electric Connected Autonomous and Shared Vehicles Technology for Sustainable Green MobilityFrontiers in Future Transportation2021
Mathematical Model for Choosing Counterparty When Assessing Information Security RisksRisks2021
A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty AheadSensors2021
Cybersecurity in the European Union port sector in light of the digital transformation and the COVID-19 pandemicWMU Journal of Maritime Affairs2021
Security in Brain-Computer InterfacesACM Computing Surveys2021
Security and Privacy Requirements for the Internet of ThingsACM Transactions on Internet of Things2021
System Requirements of Software-Defined IoT Networks for Critical InfrastructureCommunications in Computer and Information Science2021
Promoting Cybersecurity Compliance2021
From Lessons Learned to Improvements Implemented: Some Roles for Gaming in Cybersecurity Risk Management2021
The Power of Industrial CybersecurityDigitale Welt2021
The role of fifth-generation mobile technology in prehospital emergency care: An opportunity to support paramedicsHealth Policy and Technology2020
Cyber management and value creation: an organisational learning-based approachKnowledge Management Research and Practice2020
A Strategic Roadmap for the Manufacturing Industry to Implement Industry 4.0Designs2020
Riskio: A Serious Game for Cyber Security Awareness and EducationComputers and Security2020
Security and Privacy Implementation Framework as a Result of the Digitalization Process for Organizations in Different IndustriesSpringer Proceedings in Business and Economics2020
A Thermodynamic Assessment of the Cyber Security Risk in Healthcare FacilitiesAdvances in Intelligent Systems and Computing2020
The EU Cybersecurity Act and European standards: an introduction to the role of European standardizationInternational Cybersecurity Law Review2020
A Conceptual Framework to Support Digital Transformation in Manufacturing Using an Integrated Business Process Management ApproachDesigns2020