Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations

S Saeed, SA Altamimi, NA Alkayyal, E Alshehri… - Sensors, 2023 - mdpi.com
This systematic literature review explores the digital transformation (DT) and cybersecurity
implications for achieving business resilience. DT involves transitioning organizational …

Autonomous vehicles: The cybersecurity vulnerabilities and countermeasures for big data communication

A Algarni, V Thayananthan - Symmetry, 2022 - mdpi.com
The possible applications of communication based on big data have steadily increased in
several industries, such as the autonomous vehicle industry, with a corresponding increase …

Information sharing and security investment for substitutable firms: A game-theoretic analysis

X Gao, S Gong, Y Wang, Y Zhang - Journal of the Operational …, 2024 - Taylor & Francis
There are several types of relations between information assets of two firms, among which
substitutable relation is such that even when one of the firms is successfully breached by …

A multi-constraint transfer approach with additional auxiliary domains for IoT intrusion detection under unbalanced samples distribution

R Liu, W Ma, J Guo - Applied Intelligence, 2024 - Springer
Abstract The Internet of Things (IoT) refers to a vast and interconnected network comprising
smart objects with comprehensive capabilities. Unfortunately, the vulnerabilities of IoT …

Security Model and Access Control Mechanisms for Attack Mitigation in IoE

N Mathur, S Sinha - Blockchain Technology for IoE, 2023 - taylorfrancis.com
Internet of everything (IoE) is the recent and futuristic technology which obtains significant
consideration among the research associations. IoE is the modernized variant of Internet of …

Attack Detection Mechanisms for Internet of Everything (IoE) Networks

RW Anwar, KN Qureshi - … Vigilance and Security Engineering of Internet of …, 2023 - Springer
Abstract Internet of Everything (IoE) is one of the superset concepts of Internet of Thing (IoT)
based on emerging and revolutionary technologies and standards. The main building blocks …

A stochastic optimisation model to support cybersecurity within the UK national health service

E Grass, C Pagel, S Crowe, S Ghafur - Journal of the Operational …, 2024 - Taylor & Francis
Over the past decade, the adoption of new digital technologies in healthcare has surged,
significantly enhancing care delivery and accessibility. However, this digital transformation …

Networking and Security Architectures for IoE Networks

F Ullah, A Ullah - Cybersecurity Vigilance and Security Engineering of …, 2023 - Springer
Abstract Internet of Everything (IoE) is one of the smart networks where the interconnected
and autonomously managed interactive devices and sensor nodes are connected for …

Protecting Your Smarthome From a Cyberattack: A Qualitative Study

W Patterson - 2024 - search.proquest.com
The problem is the worldwide acceleration of smarthome cyberattacks. The purpose of this
study was to analyze the use of a Honeypot as a proactive process to reduce cyberattacks …

Κυβερνοασφάλεια και ψηφιακός μετασχηματισμός: συστηματική ανασκόπηση

ΣΧ Ψαρράκης - 2023 - dione.lib.unipi.gr
Αυτή η περιεκτική ανασκόπηση της υπάρχουσας βιβλιογραφίας εμβαθύνει στις προεκτάσεις
του ψηφιακού μετασχηματισμού και της ασφάλειας στον κυβερνοχώρο για την επίτευξη …