71
Citations
37
Journals
2017
First Cited
2022
Last Cited

Articles citing This Document (Page 2 of 2)

ArticleJournalYear
The Security and Privacy Protection Framework for Wearable DevicesLecture Notes in Computer Science2022
Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK FrameworkLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering2022
LCCI: A framework for least cybersecurity controls to be implemented for small and medium enterprises (SMEs)International Journal of Information Management Data Insights2022
Information System Security Risk Priority Number: A New Method for Evaluating and Prioritization Security Risk in Information System Applying FMEALecture Notes in Networks and Systems2022
Dimensions of cybersecurity performance and crisis response in critical infrastructure organisations: an intellectual capital perspectiveJournal of Intellectual Capital2021
A Design for Software Management Architecture and Software Management Information System in Time of Open SourceLecture Notes on Data Engineering and Communications Technologies2022
Saving Lives in a Health Crisis Through the National Cyber Threat Prevention Mechanism Case COVID-19Computational Methods in Applied Sciences (Springer)2022
Digital Security – Wie Unternehmen den Sicherheitsrisiken des digitalen Wandels trotzen2022
An integrated cyber security risk management framework and risk predication for the critical infrastructure protectionNeural Computing and Applications
Informationssicherheit im Internet der Dinge2021
Raising Awareness about Cloud Security in Industry through a Board GameInformation (Switzerland)2021
A System to Calculate Cyber-Value-at-RiskComputers and Security2021
Health Systems Security2020
Security Framework for Supply-Chain ManagementAdvances in Logistics, Operations, and Management Science Book Series2020
Towards the Insurance of Healthcare SystemsLecture Notes in Computer Science2020
Herausforderung Datenschutz und Datensicherheit in der Cloud2020
Japan’s Cybersecurity PolicyAdvances in Information and Communication Research2020
CySec: Cybersecurity Review Program for Professionals in JapanAdvances in Intelligent Systems and Computing2021
Digital Security – Wie Unternehmen den Sicherheitsrisiken des digitalen Wandels trotzen2020
Privacy Implication and Technical Requirements Toward GDPR ComplianceAdvances in Intelligent Systems and Computing2020
KIET Framework for Cloud Adoption2019
Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEsCommunications in Computer and Information Science2019
Defining a New Composite Cybersecurity Rating Scheme for SMEs in the U.K.Lecture Notes in Computer Science2019
Extension of ISO/IEC27001 to Mobile Devices Security ManagementCommunications in Computer and Information Science2019
Promoting Cybersecurity ComplianceAdvances in Information Security, Privacy, and Ethics Book Series2019
Why One Should Learn Ethical Hacking2019
Anwendungsfälle für LoRaWAN2019
A Markov Model of IoT System Availability Considering DDoS Attacks, Patching and Energy ModesStudies in Systems, Decision and Control2019
Digital Security – Wie Unternehmen den Sicherheitsrisiken des digitalen Wandels trotzen2018
Information Security ManagementAdvances in Information Security, Privacy, and Ethics Book Series2018
Building an IoT Ecosystem Framework2017
Security Framework for Supply-Chain Management2022
Automotive Intelligence Embedded in Electric Connected Autonomous and Shared Vehicles Technology for Sustainable Green MobilityFrontiers in Future Transportation2021
Mathematical Model for Choosing Counterparty When Assessing Information Security RisksRisks2021
A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty AheadSensors2021
Cybersecurity in the European Union port sector in light of the digital transformation and the COVID-19 pandemicWMU Journal of Maritime Affairs2021
Security in Brain-Computer InterfacesACM Computing Surveys2021
Security and Privacy Requirements for the Internet of ThingsACM Transactions on Internet of Things2021
System Requirements of Software-Defined IoT Networks for Critical InfrastructureCommunications in Computer and Information Science2021
Promoting Cybersecurity Compliance2021
From Lessons Learned to Improvements Implemented: Some Roles for Gaming in Cybersecurity Risk Management2021
The Power of Industrial CybersecurityDigitale Welt2021
The role of fifth-generation mobile technology in prehospital emergency care: An opportunity to support paramedicsHealth Policy and Technology2020
Cyber management and value creation: an organisational learning-based approachKnowledge Management Research and Practice2020
A Strategic Roadmap for the Manufacturing Industry to Implement Industry 4.0Designs2020
Riskio: A Serious Game for Cyber Security Awareness and EducationComputers and Security2020
Security and Privacy Implementation Framework as a Result of the Digitalization Process for Organizations in Different IndustriesSpringer Proceedings in Business and Economics2020
A Thermodynamic Assessment of the Cyber Security Risk in Healthcare FacilitiesAdvances in Intelligent Systems and Computing2020
The EU Cybersecurity Act and European standards: an introduction to the role of European standardizationInternational Cybersecurity Law Review2020
A Conceptual Framework to Support Digital Transformation in Manufacturing Using an Integrated Business Process Management ApproachDesigns2020
Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysisFuture Generation Computer Systems2020
Maintenance of complex, converged, and interoperable medical device/information systems2020
Model Driven Architectural Design of Information Security SystemAdvances in Intelligent Systems and Computing2020
The challenges of assembling, maintaining and making available large data sets of clinical data for research2019
Defining the Minimum Security Baseline in a Multiple Security Standards Environment by Graph Theory TechniquesApplied Sciences (Switzerland)2019
Cybersecurity2019
Building consumer trust in the cloud: an experimental analysis of the cloud trust label approachJournal of Cloud Computing: Advances, Systems and Applications2019
A SGAM-Based Test Platform to Develop a Scheme for Wide Area Measurement-Free Monitoring of Smart Grids under High PV PenetrationEnergies2019
A Design Approach to IoT Endpoint Security for Production Machinery MonitoringSensors2019
An Integrated Model of Technical and Non-Technical Perspectives on Managing IoT Security2019
Requirements elicitation for secure and interoperable cross-border health data exchange: the KONFIDO studyIET Software2019
High Performance Technology in Algorithmic Cryptography2018
Comprehensive user requirements engineering methodology for secure and interoperable health data exchangeBMC Medical Informatics and Decision Making2018
Challenges and mitigation approaches for getting secured applications in an enterprise company2018
A unified cybersecurity framework for complex environments2018
Cybersecurity level in IPS2: A case study of two industrial internet-based SME offeringsProcedia CIRP2018
Issues of Implied Trust in Ethical HackingORBIT Journal2018
CloudWoT - A Reference Model for Knowledge-based IoT Solutions2018
Rethinking the Proposition of Privacy Engineering2018
Certifications Past and Future: A Future Model for Assigning Certifications that Incorporate Lessons Learned from Past Practices2018
KIET Framework for Cloud AdoptionInternational Journal of Cloud Applications and Computing2018