Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

Privacy preservation of electronic health records in the modern era: A systematic survey

R Nowrozy, K Ahmed, ASM Kayes, H Wang… - ACM Computing …, 2024 - dl.acm.org
Building a secure and privacy-preserving health data sharing framework is a topic of great
interest in the healthcare sector, but its success is subject to ensuring the privacy of user …

[HTML][HTML] Cryptographic ransomware encryption detection: Survey

K Begovic, A Al-Ali, Q Malluhi - Computers & Security, 2023 - Elsevier
The ransomware threat has loomed over our digital life since 1989. Criminals use this type
of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts …

Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments

L Fernandez Maimo, A Huertas Celdran… - Sensors, 2019 - mdpi.com
Medical Cyber-Physical Systems (MCPS) hold the promise of reducing human errors and
optimizing healthcare by delivering new ways to monitor, diagnose and treat patients …

A quantitative bow-tie cyber risk classification and assessment framework

B Sheehan, F Murphy, AN Kia, R Kiely - Journal of Risk Research, 2021 - Taylor & Francis
Cyber-attacks pose a growing threat to global commerce that is increasingly reliant on digital
technology to conduct business. Traditional risk assessment and underwriting practices face …

[PDF][PDF] Automated analysis approach for the detection of high survivable ransomware

YA Ahmed, B Kocer, BAS Al-rimy - … on Internet and Information Systems (TIIS …, 2020 - itiis.org
Ransomware is malicious software that encrypts the user-related files and data and holds
them to ransom. Such attacks have become one of the serious threats to cyberspace. The …

[HTML][HTML] Evaluation of live forensic techniques, towards Salsa20-Based cryptographic ransomware mitigation

LF de Loaysa Babiano, R Macfarlane… - Forensic Science …, 2023 - Elsevier
Ransomware has been established as one of the largest current threats to organisations,
small businesses, governments, and individuals alike. The appearance of cryptocurrencies …

Sdn-based detection of self-propagating ransomware: the case of badrabbit

FM Alotaibi, VG Vassilakis - Ieee Access, 2021 - ieeexplore.ieee.org
In the last decade, many ransomware attacks had the ability to spread within local networks
or even outside them. At the same time, software defined networking (SDN) has provided a …

Cybersecurity Concerns Under COVID-19: Representations on Increasing Digital Literacy in Higher Education

J Lourenço, JC Morais, S Sá, N Neves… - Perspectives and Trends …, 2023 - Springer
The COVID-19 brought several new challenges for the students and lecturers, particularly in
higher education. The conventional physical classroom was almost instantly pushed into a …

Development of the Concept of Cybersecurity of the Organization

AA Loishyn, S Hohoniants, M YaTkach… - TEM Journal, 2021 - ceeol.com
The article is of interest to managers and scientists at all levels who deal with combating
cyber threats. The study analyzed the security environment and confirmed the rapid growth …