Defining security requirements with the common criteria: Applications, adoptions, and challenges

N Sun, CT Li, H Chan, BD Le, MZ Islam… - IEEE …, 2022 - ieeexplore.ieee.org
Advances in emerging Information and Communications Technology (ICT) technologies
push the boundaries of what is possible and open up new markets for innovative ICT …

How do organizations seek cyber assurance? Investigations on the adoption of the common criteria and beyond

N Sun, CT Li, H Chan, MZ Islam, MR Islam… - Ieee …, 2022 - ieeexplore.ieee.org
Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and
other unexpected events, is essential for organizations facing inundating security threats on …

A strategic approach to model the machine-to-machine communication of industrial IoT system for MQTT protocol with a case study

S Pawar, S Patil - Proceedings of 3rd International Conference on …, 2022 - Springer
Abstract The Industrial IoT systems are now becoming more complex and ubiquitous as they
are integrating large number of physical devices, and virtual services are expanding over …

[PDF][PDF] A novel image encryption approach for IoT applications

WA Alawsi, HK Obayes, SM Hussain - Webology, 2022 - researchgate.net
The rapid developments observed in the field of Internet of Things (IoT), along with the
recently increasing dependence on this technology in home and financial applications, have …

[PDF][PDF] A CRITICAL REVIEW OF THE IMPLEMENTATION OF THE SECURITY THREAT ASSESSMENT BY A SELECTION OF GOVERNMENT DEPARTMENT IN …

LW MAHLATSI, C JUSTICE - 2022 - researchgate.net
A CRITICAL REVIEW OF THE IMPLEMENTATION OF THE SECURITY THREAT
ASSESSMENT BY A SELECTION OF GOVERNMENT DEPARTMENT IN GAUTENG by …

Information security aspects surrounding SMMEs in Cape Town, South Africa

S Mokolo - 2022 - etd.cput.ac.za
Information security management is a crucial factor for all organisations under the current
scenario of business globalisation. Businesses and organisations have availed huge …