Interoperability of heterogeneous health information systems: a systematic literature review

A Torab-Miandoab, T Samad-Soltani, A Jodati… - BMC Medical Informatics …, 2023 - Springer
Background The lack of interoperability between health information systems reduces the
quality of care provided to patients and wastes resources. Accordingly, there is an urgent …

[HTML][HTML] Cyber-threat intelligence for security decision-making: A review and research agenda for practice

S Ainslie, D Thompson, S Maynard, A Ahmad - Computers & Security, 2023 - Elsevier
The increasing militarization of the cyber-threat environment has driven considerable
interest in understanding the role of cyber-threat intelligence (CTI) in supporting the …

A maturity model for evaluating the impact of Industry 4.0 technologies and principles in SMEs

C Semeraro, N Alyousuf, NI Kedir - Manufacturing Letters, 2023 - Elsevier
Various organizations aspire to advance technologically by applying Industry 4.0 (I4. 0)
technologies and principles. Small and medium-sized enterprises (SMEs) struggle to be …

The nature of law

C de Silva - Galbraith's Construction and Land Management Law …, 2020 - taylorfrancis.com
Any society quickly finds that it needs rules or laws to enable it to function smoothly.
Consider the results if you had decided to drive to work today on the right instead of the left …

Key requirements for the detection and sharing of behavioral indicators of compromise

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Electronics, 2022 - mdpi.com
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …

Critical energy infrastructure and the evolution of cybersecurity

P Sanders, C Bronk, MD Bazilian - The Electricity Journal, 2022 - Elsevier
Cybersecurity has risen to a position of great significance in global affairs. This is
intensifying in many sectors, including energy. Protection of the Critical Energy Infrastructure …

The need for cybersecurity in industrial revolution and smart cities

A Clim, A Toma, RD Zota, R Constantinescu - Sensors, 2022 - mdpi.com
Cities have grown in development and sophistication throughout human history. Smart cities
are the current incarnation of this process, with increased complexity and social importance …

An autoML network traffic analyzer for cyber threat detection

A Papanikolaou, A Alevizopoulos, C Ilioudis… - International Journal of …, 2023 - Springer
Timely detection and effective treatment of cyber-attacks for protecting personal and
sensitive data from unauthorized disclosure constitute a core demand of citizens and a legal …

Social engineering attacks a reconnaissance synthesis analysis

MR Arabia-Obedoza, G Rodriguez… - 2020 11th IEEE …, 2020 - ieeexplore.ieee.org
Social Engineering outweighs any other security threats as it has proven to be one of the
easiest, cheapest, and most potent and highly successful ways for criminals to achieve their …

Towards the design of a collaborative cybersecurity networked organisation: identification and prioritisation of governance needs and objectives

T Tagarev - Future Internet, 2020 - mdpi.com
The effective response to the proliferation and growing diversity and sophistication of cyber
threats requires a broad spectrum of competencies, human, technological and financial …