[HTML][HTML] A comprehensive study of security and cyber-security risk management within e-Health systems: Synthesis, analysis and a novel quantified approach

S Ksibi, F Jaidi, A Bouhoula - Mobile Networks and Applications, 2023 - Springer
Abstract Internet of Things (IoT) applications are among the major trends of nowadays.
Billions of connected devices are creating great business profits and performing a multitude …

A systematic literature review for authorization and access control: definitions, strategies and models

AKYS Mohamed, D Auer, D Hofer… - International journal of web …, 2022 - emerald.com
Purpose Authorization and access control have been a topic of research for several
decades. However, existing definitions are inconsistent and even contradicting each other …

A survey for user behavior analysis based on machine learning techniques: current models and applications

A G. Martín, A Fernández-Isabel, I Martín de Diego… - Applied …, 2021 - Springer
Significant research has been carried out in the field of User Behavior Analysis, focused on
understanding, modeling and predicting past, present and future behaviors of users …

Multimodel-based incident prediction and risk assessment in dynamic cybersecurity protection for industrial control systems

Q Zhang, C Zhou, N Xiong, Y Qin, X Li… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Currently, an increasing number of information/communication technologies are adopted
into the industrial control systems (ICSs). While these IT technologies offer high flexibility …

Is this really you? An empirical study on risk-based authentication applied in the wild

S Wiefling, L Lo Iacono, M Dürmuth - … and Privacy Protection: 34th IFIP TC …, 2019 - Springer
Risk-based authentication (RBA) is an adaptive security measure to strengthen password-
based authentication. RBA monitors additional implicit features during password entry such …

More than just good passwords? A study on usability and security perceptions of risk-based authentication

S Wiefling, M Dürmuth, L Lo Iacono - Proceedings of the 36th Annual …, 2020 - dl.acm.org
Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-
based authentication. RBA monitors additional features during login, and when observed …

[HTML][HTML] Risk-based access control model: A systematic literature review

HF Atlam, MA Azad, MO Alassafi, AA Alshdadi… - Future Internet, 2020 - mdpi.com
Most current access control models are rigid, as they are designed using static policies that
always give the same outcome in different circumstances. In addition, they cannot adapt to …

What's in score for website users: A data-driven long-term study on risk-based authentication characteristics

S Wiefling, M Dürmuth, L Lo Iacono - … , FC 2021, Virtual Event, March 1–5 …, 2021 - Springer
Risk-based authentication (RBA) aims to strengthen password-based authentication rather
than replacing it. RBA does this by monitoring and recording additional features during the …

A framework and risk assessment approaches for risk-based access control in the cloud

DR dos Santos, R Marinho, GR Schmitt… - Journal of Network and …, 2016 - Elsevier
Cloud computing is advantageous for customers and service providers. However, it has
specific security requirements that are not captured by traditional access control models, eg …

Super learner ensemble for anomaly detection and cyber-risk quantification in industrial control systems

G Ahmadi-Assalemi, H Al-Khateeb… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Industrial control systems (ICSs) are integral parts of smart cities and critical to modern
societies. Despite indisputable opportunities introduced by disruptor technologies, they …