A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles

SK Khan, N Shiwakoti, P Stasinopoulos - Accident Analysis & Prevention, 2022 - Elsevier
Abstract Emerging Connected and Autonomous Vehicles (CAVs) technology have a
ubiquitous communication framework. It poses security challenges in the form of cyber …

Cybersecurity and information assurance for the clinical laboratory

AU Patel, CL Williams, SN Hart… - The journal of …, 2023 - academic.oup.com
Background Network-connected medical devices have rapidly proliferated in the wake of
recent global catalysts, leaving clinical laboratories and healthcare organizations vulnerable …

[HTML][HTML] Modelling cybersecurity regulations for automated vehicles

SK Khan, N Shiwakoti, P Stasinopoulos… - Accident Analysis & …, 2023 - Elsevier
Technological advancements in Connected and Automated Vehicles (CAVs), particularly the
integration of diverse stakeholder groups (communication service providers, road operators …

A survey of intelligent multimedia forensics for internet of things communications: Approaches, strategies, perspectives, and challenges for a sustainable future

W Ding, M Abdel-Basset, AM Ali, N Moustafa - Engineering Applications of …, 2024 - Elsevier
Digital forensics is a proven method for collecting, preserving, reporting, analyzing,
identifying, and presenting digital evidence from the original data, and it helps find evidence …

ForensicTransMonitor: A Comprehensive Blockchain Approach to Reinvent Digital Forensics and Evidence Management

SS Alqahtany, TA Syed - Information, 2024 - mdpi.com
In the domain of computer forensics, ensuring the integrity of operations like preservation,
acquisition, analysis, and documentation is critical. Discrepancies in these processes can …

[HTML][HTML] Cybersecurity framework for connected and automated vehicles: A modelling perspective

SK Khan, N Shiwakoti, P Stasinopoulos, Y Chen… - Transport Policy, 2025 - Elsevier
Abstract Connected and Automated Vehicles (CAVs) cybersecurity is an inherently complex,
multi-dimensional issue that goes beyond isolated hardware or software vulnerabilities …

An early detection model for kerberoasting attacks and dataset labeling

R Younisse, M Alkasassbeh… - Jordanian Journal of …, 2023 - search.proquest.com
The wild nature of humans has become civilized and the weapons they use to attack each
other are now digitized. Security over the Internet usually takes a defensive shape, aiming to …

Impacto del uso de diversos marcos de seguridad en las auditorías informáticas dentro de las organizaciones: Revisión sistemática

MA Burgos-Rojas, CI Haro-Polo… - Revista Científica de la …, 2024 - scielo.iics.una.py
En un mundo donde los ataques a la seguridad de la información en las organizaciones se
han incrementado, surge la auditoría informática como una solución para prevenir estos …

[PDF][PDF] The role of raspberry Pi in forensic computer crimes

B Fakiha - Journal of Internet Services and Information Security, 2023 - jisis.org
This study examined the use of Raspberry Pi for forensic analysis and its potential for
providing computer protection. It investigates its capability to identify suspicious patterns on …

Phishing attack types and mitigation: A survey

MF Alghenaim, NAA Bakar, F Abdul Rahim… - … Conference on Data …, 2022 - Springer
The proliferation of the internet and computing devices has drawn much attention during the
Covid-19 pandemic stay home and work, and this has led the organization to adapt to …