The Security and Privacy Protection Framework for Wearable Devices | Lecture Notes in Computer Science | 2022 |
Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK Framework | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | 2022 |
LCCI: A framework for least cybersecurity controls to be implemented for small and medium enterprises (SMEs) | International Journal of Information Management Data Insights | 2022 |
Information System Security Risk Priority Number: A New Method for Evaluating and Prioritization Security Risk in Information System Applying FMEA | Lecture Notes in Networks and Systems | 2022 |
Dimensions of cybersecurity performance and crisis response in critical infrastructure organisations: an intellectual capital perspective | Journal of Intellectual Capital | 2021 |
A Design for Software Management Architecture and Software Management Information System in Time of Open Source | Lecture Notes on Data Engineering and Communications Technologies | 2022 |
Saving Lives in a Health Crisis Through the National Cyber Threat Prevention Mechanism Case COVID-19 | Computational Methods in Applied Sciences (Springer) | 2022 |
Digital Security – Wie Unternehmen den Sicherheitsrisiken des digitalen Wandels trotzen | | 2022 |
An integrated cyber security risk management framework and risk predication for the critical infrastructure protection | Neural Computing and Applications | |
Informationssicherheit im Internet der Dinge | | 2021 |
Raising Awareness about Cloud Security in Industry through a Board Game | Information (Switzerland) | 2021 |
A System to Calculate Cyber-Value-at-Risk | Computers and Security | 2021 |
Health Systems Security | | 2020 |
Security Framework for Supply-Chain Management | Advances in Logistics, Operations, and Management Science Book Series | 2020 |
Towards the Insurance of Healthcare Systems | Lecture Notes in Computer Science | 2020 |
Herausforderung Datenschutz und Datensicherheit in der Cloud | | 2020 |
Japan’s Cybersecurity Policy | Advances in Information and Communication Research | 2020 |
CySec: Cybersecurity Review Program for Professionals in Japan | Advances in Intelligent Systems and Computing | 2021 |
Digital Security – Wie Unternehmen den Sicherheitsrisiken des digitalen Wandels trotzen | | 2020 |
Privacy Implication and Technical Requirements Toward GDPR Compliance | Advances in Intelligent Systems and Computing | 2020 |
KIET Framework for Cloud Adoption | | 2019 |
Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs | Communications in Computer and Information Science | 2019 |
Defining a New Composite Cybersecurity Rating Scheme for SMEs in the U.K. | Lecture Notes in Computer Science | 2019 |
Extension of ISO/IEC27001 to Mobile Devices Security Management | Communications in Computer and Information Science | 2019 |
Promoting Cybersecurity Compliance | Advances in Information Security, Privacy, and Ethics Book Series | 2019 |
Why One Should Learn Ethical Hacking | | 2019 |
Anwendungsfälle für LoRaWAN | | 2019 |
A Markov Model of IoT System Availability Considering DDoS Attacks, Patching and Energy Modes | Studies in Systems, Decision and Control | 2019 |
Digital Security – Wie Unternehmen den Sicherheitsrisiken des digitalen Wandels trotzen | | 2018 |
Information Security Management | Advances in Information Security, Privacy, and Ethics Book Series | 2018 |
Building an IoT Ecosystem Framework | | 2017 |
Security Framework for Supply-Chain Management | | 2022 |
Automotive Intelligence Embedded in Electric Connected Autonomous and Shared Vehicles Technology for Sustainable Green Mobility | Frontiers in Future Transportation | 2021 |
Mathematical Model for Choosing Counterparty When Assessing Information Security Risks | Risks | 2021 |
A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead | Sensors | 2021 |
Cybersecurity in the European Union port sector in light of the digital transformation and the COVID-19 pandemic | WMU Journal of Maritime Affairs | 2021 |
Security in Brain-Computer Interfaces | ACM Computing Surveys | 2021 |
Security and Privacy Requirements for the Internet of Things | ACM Transactions on Internet of Things | 2021 |
System Requirements of Software-Defined IoT Networks for Critical Infrastructure | Communications in Computer and Information Science | 2021 |
Promoting Cybersecurity Compliance | | 2021 |
From Lessons Learned to Improvements Implemented: Some Roles for Gaming in Cybersecurity Risk Management | | 2021 |
The Power of Industrial Cybersecurity | Digitale Welt | 2021 |
The role of fifth-generation mobile technology in prehospital emergency care: An opportunity to support paramedics | Health Policy and Technology | 2020 |
Cyber management and value creation: an organisational learning-based approach | Knowledge Management Research and Practice | 2020 |
A Strategic Roadmap for the Manufacturing Industry to Implement Industry 4.0 | Designs | 2020 |
Riskio: A Serious Game for Cyber Security Awareness and Education | Computers and Security | 2020 |
Security and Privacy Implementation Framework as a Result of the Digitalization Process for Organizations in Different Industries | Springer Proceedings in Business and Economics | 2020 |
A Thermodynamic Assessment of the Cyber Security Risk in Healthcare Facilities | Advances in Intelligent Systems and Computing | 2020 |
The EU Cybersecurity Act and European standards: an introduction to the role of European standardization | International Cybersecurity Law Review | 2020 |
A Conceptual Framework to Support Digital Transformation in Manufacturing Using an Integrated Business Process Management Approach | Designs | 2020 |
Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis | Future Generation Computer Systems | 2020 |
Maintenance of complex, converged, and interoperable medical device/information systems | | 2020 |
Model Driven Architectural Design of Information Security System | Advances in Intelligent Systems and Computing | 2020 |
The challenges of assembling, maintaining and making available large data sets of clinical data for research | | 2019 |
Defining the Minimum Security Baseline in a Multiple Security Standards Environment by Graph Theory Techniques | Applied Sciences (Switzerland) | 2019 |
Cybersecurity | | 2019 |
Building consumer trust in the cloud: an experimental analysis of the cloud trust label approach | Journal of Cloud Computing: Advances, Systems and Applications | 2019 |
A SGAM-Based Test Platform to Develop a Scheme for Wide Area Measurement-Free Monitoring of Smart Grids under High PV Penetration | Energies | 2019 |
A Design Approach to IoT Endpoint Security for Production Machinery Monitoring | Sensors | 2019 |
An Integrated Model of Technical and Non-Technical Perspectives on Managing IoT Security | | 2019 |
Requirements elicitation for secure and interoperable cross-border health data exchange: the KONFIDO study | IET Software | 2019 |
High Performance Technology in Algorithmic Cryptography | | 2018 |
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange | BMC Medical Informatics and Decision Making | 2018 |
Challenges and mitigation approaches for getting secured applications in an enterprise company | | 2018 |
A unified cybersecurity framework for complex environments | | 2018 |
Cybersecurity level in IPS2: A case study of two industrial internet-based SME offerings | Procedia CIRP | 2018 |
Issues of Implied Trust in Ethical Hacking | ORBIT Journal | 2018 |
CloudWoT - A Reference Model for Knowledge-based IoT Solutions | | 2018 |
Rethinking the Proposition of Privacy Engineering | | 2018 |
Certifications Past and Future: A Future Model for Assigning Certifications that Incorporate Lessons Learned from Past Practices | | 2018 |
KIET Framework for Cloud Adoption | International Journal of Cloud Applications and Computing | 2018 |