You are currently on the new version of our website. Access the old version .

392 Results Found

  • Article
  • Open Access
5 Citations
4,614 Views
14 Pages

25 August 2023

Cyber security importance has escalated globally, driven by its pivotal role in shaping daily life, encompassing both personal and non-personal aspects. Cyber security breach probability functions play a crucial role in comprehending how cyber securi...

  • Article
  • Open Access
5 Citations
6,773 Views
29 Pages

With the continuous expansion of air traffic flow, the increasingly serious aviation network security threats have a significant and far-reaching impact on the safe operation of the aviation industry. The networked air traffic management (ATM) system...

  • Article
  • Open Access
12 Citations
6,366 Views
29 Pages

24 January 2022

Background: Cyber security has turned out to be one of the main challenges of recent years. As the variety of system and application vulnerabilities has increased dramatically in recent years, cyber attackers have managed to penetrate the networks an...

  • Article
  • Open Access
25 Citations
5,644 Views
20 Pages

Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with soci...

  • Article
  • Open Access
2 Citations
6,499 Views
21 Pages

With ongoing cyber threats stemming from persistent hacking attempts, relentless efforts are being made to prevent such threats at their source. Recently, the concept of “zero trust”, introduced by the United States National Institute of...

  • Article
  • Open Access
19 Citations
8,176 Views
12 Pages

18 October 2021

The aim of this paper is to deepen the application of value at risk in the cyber domain, with particular attention to its potential role in security investment valuation. Cyber risk is a fundamental component of the overall risk faced by any organiza...

  • Article
  • Open Access
15 Citations
4,763 Views
28 Pages

12 January 2021

Investments in security and cyber-insurance are two cyber-risk management strategies that can be employed together to optimize the overall security expense. In this paper, we provide a closed form for the optimal investment under a full set of insura...

  • Article
  • Open Access
10 Citations
4,283 Views
44 Pages

A Survey on Cyber Risk Management for the Internet of Things

  • Emily Kate Parsons,
  • Emmanouil Panaousis,
  • George Loukas and
  • Georgia Sakellari

7 August 2023

The Internet of Things (IoT) continues to grow at a rapid pace, becoming integrated into the daily operations of individuals and organisations. IoT systems automate crucial services within daily life that users may rely on, which makes the assurance...

  • Article
  • Open Access
22 Citations
8,734 Views
25 Pages

Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers

  • Sander Zeijlemaker,
  • Etiënne A. J. A. Rouwette,
  • Giovanni Cunico,
  • Stefano Armenia and
  • Michael von Kutzschenbach

14 April 2022

Cyber-security incidents show how difficult it is to make optimal strategic decisions in such a complex environment. Given that it is hard for researchers to observe organisations’ decision-making processes driving cyber-security strategy, we d...

  • Article
  • Open Access
3 Citations
5,180 Views
23 Pages

Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study

  • Giseok Jeong,
  • Kookjin Kim,
  • Sukjoon Yoon,
  • Dongkyoo Shin and
  • Jiwon Kang

12 October 2023

As the world undergoes rapid digitalization, individuals and objects are becoming more extensively connected through the advancement of Internet networks. This phenomenon has been observed in governmental and military domains as well, accompanied by...

  • Article
  • Open Access
5 Citations
3,109 Views
18 Pages

13 September 2024

This study aimed to strengthen the security of autonomous vehicles by analyzing the current status of autonomous vehicle security, such as autonomous vehicle features, security threats, and compliance, and deriving security-level check items. Based o...

  • Review
  • Open Access
33 Citations
7,713 Views
37 Pages

Intelligent Buildings in Smart Grids: A Survey on Security and Privacy Issues Related to Energy Management

  • Alvaro Llaria,
  • Jessye Dos Santos,
  • Guillaume Terrasson,
  • Zina Boussaada,
  • Christophe Merlo and
  • Octavian Curea

10 May 2021

During the last decade, the smart grid (SG) concept has started to become a reality, mainly thanks to the technical progress achieved in telecommunications, informatics and power electronics, among other domains, leading to an evolution of the tradit...

  • Article
  • Open Access
5 Citations
4,076 Views
21 Pages

1 February 2025

This study aims to describe and assess the impact of critical infrastructure (CI) cybersecurity issues on the sustainable development of smart cities. This study highlights the integration of PayTech systems into the broader CI landscape, highlightin...

  • Article
  • Open Access
1 Citations
3,610 Views
22 Pages

18 December 2024

In the 4th industrial era, the proliferation of interconnected smart devices and advancements in AI, particularly big data and machine learning, have integrated various industrial domains into cyberspace. This convergence brings novel security threat...

  • Article
  • Open Access
7 Citations
2,857 Views
32 Pages

Enhancing the Efficiency of a Cybersecurity Operations Center Using Biomimetic Algorithms Empowered by Deep Q-Learning

  • Rodrigo Olivares,
  • Omar Salinas,
  • Camilo Ravelo,
  • Ricardo Soto and
  • Broderick Crawford

In the complex and dynamic landscape of cyber threats, organizations require sophisticated strategies for managing Cybersecurity Operations Centers and deploying Security Information and Event Management systems. Our study enhances these strategies b...

  • Article
  • Open Access
5 Citations
11,706 Views
25 Pages

An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure

  • Habib El Amin,
  • Abed Ellatif Samhat,
  • Maroun Chamoun,
  • Lina Oueidat and
  • Antoine Feghali

Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strat...

  • Article
  • Open Access
3 Citations
1,450 Views
24 Pages

Enhancing Smart Grid Reliability Through Data-Driven Optimisation and Cyber-Resilient EV Integration

  • Muhammed Cavus,
  • Huseyin Ayan,
  • Mahmut Sari,
  • Osman Akbulut,
  • Dilum Dissanayake and
  • Margaret Bell

25 August 2025

This study presents a novel cyber-resilient, data-driven optimisation framework for real-time energy management in electric vehicle (EV)-integrated smart grids. The proposed framework integrates a hybrid optimisation engine—combining genetic al...

  • Article
  • Open Access
757 Views
28 Pages

Integrating the CRA into the IoT Lifecycle: Challenges, Strategies, and Best Practices

  • Miguel Ángel Ortega Velázquez,
  • Iris Cuevas Martínez and
  • Antonio J. Jara

22 November 2025

The European Union’s Cyber Resilience Act (CRA) introduces a complex set of binding lifecycle security obligations, presenting a significant compliance challenge for the Internet of Things (IoT) industry. This study addresses this challenge by...

  • Article
  • Open Access
48 Citations
5,873 Views
21 Pages

Secure Healthcare Record Sharing Mechanism with Blockchain

  • Ghulam Qadar Butt,
  • Toqeer Ali Sayed,
  • Rabia Riaz,
  • Sanam Shahla Rizvi and
  • Anand Paul

23 February 2022

The transfer of information is a demanding issue, particularly due to the presence of a large number of eavesdroppers on communication channels. Sharing medical service records between different clinical jobs is a basic and testing research topic. Th...

  • Article
  • Open Access
9 Citations
5,459 Views
16 Pages

Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures

  • Noritaka Matsumoto,
  • Junya Fujita,
  • Hiromichi Endoh,
  • Tsutomu Yamada,
  • Kenji Sawada and
  • Osamu Kaneko

8 November 2021

Cyber-security countermeasures are important for IIoT (industrial Internet of things) systems in which IT (information technology) and OT (operational technology) are integrated. The appropriate asset management is the key to creating strong security...

  • Article
  • Open Access
58 Citations
36,519 Views
20 Pages

10 May 2023

Cyber threats are attempts to secure unauthorized access to, change, or delete private information, to demand money from victims, or to disrupt business. Cybercrime includes everything from identity theft, malware threats, email and online fraud, to...

  • Review
  • Open Access
40 Citations
9,390 Views
33 Pages

Cyber-Physical Cloud Battery Management Systems: Review of Security Aspects

  • Farshid Naseri,
  • Zahra Kazemi,
  • Peter Gorm Larsen,
  • Mohammad Mehdi Arefi and
  • Erik Schaltz

Battery management systems (BMSs) are critical to ensure the efficiency and safety of high-power battery energy storage systems (BESSs) in vehicular and stationary applications. Recently, the proliferation of battery big data and cloud computing adva...

  • Review
  • Open Access
12 Citations
3,447 Views
23 Pages

13 June 2023

On 28 February–2 March 2023, the 2023 States General of Artificial Intelligence (AI) event was held in Italy under the sponsorship of several multinational companies. The purpose of this event was mainly to create a venue for allowing international p...

  • Case Report
  • Open Access
1 Citations
2,133 Views
25 Pages

15 November 2023

The ongoing digitalization of critical infrastructures enables more efficient processes, but also comes with new challenges related to potential cyber-physical attacks or incidents. To manage their associated risk, a precise and systematic framework...

  • Review
  • Open Access
26 Citations
6,438 Views
29 Pages

A Multidisciplinary Approach for the Development of Smart Distribution Networks

  • Emilio Ghiani,
  • Alessandro Serpi,
  • Virginia Pilloni,
  • Giuliana Sias,
  • Marco Simone,
  • Gianluca Marcialis,
  • Giuliano Armano and
  • Paolo Attilio Pegoraro

21 September 2018

Electric power systems are experiencing relevant changes involving the growing penetration of distributed generation and energy storage systems, the introduction of electric vehicles, the management of responsive loads, the proposals for new energy m...

  • Review
  • Open Access
10 Citations
5,065 Views
30 Pages

8 April 2025

Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and tru...

  • Article
  • Open Access
2 Citations
4,283 Views
30 Pages

15 September 2023

The issue of Automated Meter Management (AMM), an integral part of modern energy smart grid systems, has become a hot topic in recent years. With the current energy crisis, and given the new approaches to smart energy and its regulation, implemented...

  • Review
  • Open Access
57 Citations
12,801 Views
16 Pages

Cyber Risk in Health Facilities: A Systematic Literature Review

  • Alberto Sardi,
  • Alessandro Rizzi,
  • Enrico Sorano and
  • Anna Guerrieri

27 August 2020

The current world challenges include issues such as infectious disease pandemics, environmental health risks, food safety, and crime prevention. Through this article, a special emphasis is given to one of the main challenges in the healthcare sector...

  • Editorial
  • Open Access
2 Citations
2,631 Views
2 Pages

Information and Future Internet Security, Trust and Privacy

  • Weizhi Meng,
  • Thanassis Giannetsos and
  • Christian D. Jensen

12 December 2022

The Internet has rapidly grown into a distributed and collaborative network with over one billion users, e.g., the Internet of Things (IoT). The future Internet will become the core of the next information infrastructure in regard to computation and...

  • Article
  • Open Access
17 Citations
5,939 Views
13 Pages

SAWIT—Security Awareness Improvement Tool in the Workplace

  • Ana Kovačević and
  • Sonja D. Radenković

28 April 2020

Cyberattacks are becoming increasingly sophisticated and severe, and an organization’s protection depends on its weakest member. Although users are aware of the risks in cyberspace, most of them do not follow best practices, and there is a need...

  • Article
  • Open Access
1,047 Views
31 Pages

10 November 2025

The rapid evolution of cyber threats requires intelligence sharing between organizations while ensuring data privacy and contributor credibility. Existing centralized cyber threat intelligence (CTI) systems suffer from single points of failure, priva...

  • Article
  • Open Access
318 Views
79 Pages

22 December 2025

The security and integrity of election systems represent fundamental pillars of democratic governance in the 21st century. As electoral processes increasingly rely on networked technologies and digital infrastructures, the vulnerability of these syst...

  • Article
  • Open Access
146 Views
17 Pages

19 January 2026

As Thailand’s financial sector accelerates its digital transformation, cybersecurity has transitioned from a mere technical support function to a strategic imperative that governs operational risk and financial stability. This study empirically...

  • Proceeding Paper
  • Open Access
1 Citations
2,687 Views
5 Pages

DRIvE Project Unlocks Demand Response Potential with Digital Twins

  • Laura Pérez,
  • Juan Espeche,
  • Tatiana Loureiro and
  • Aleksandar Kavgić

DRIvE (Demand Response Integration Technologies) is a research and innovation project funded under the European Union’s Horizon 2020 Framework Program, whose main objective is unlocking the demand response potential in the distribution grid. DR...

  • Article
  • Open Access
6 Citations
2,351 Views
18 Pages

Hybrid Fuzzy Rule Algorithm and Trust Planning Mechanism for Robust Trust Management in IoT-Embedded Systems Integration

  • Nagireddy Venkata Rajasekhar Reddy,
  • Pydimarri Padmaja,
  • Miroslav Mahdal,
  • Selvaraj Seerangan,
  • Vrince Vimal,
  • Vamsidhar Talasila and
  • Lenka Cepova

1 June 2023

The Internet of Things (IoT) is rapidly expanding and becoming an integral part of daily life, increasing the potential for security threats such as malware or cyberattacks. Many embedded systems (ESs), responsible for handling sensitive data or faci...

  • Review
  • Open Access
31 Citations
5,774 Views
16 Pages

13 January 2024

The potential application of the digital twins concept and its principles to all industries, including agriculture, has recently been the subject of considerable research interest. Since livestock farming is one of the mainstays of the agricultural i...

  • Review
  • Open Access
25 Citations
9,646 Views
17 Pages

Development of an Intelligent Urban Water Network System

  • Kiran Joseph,
  • Ashok K. Sharma and
  • Rudi van Staden

19 April 2022

Water and wastewater services have been provided through centralised systems for more than a century. The operational and management approaches of the water systems face challenges induced by population growth, urbanisation, and ageing infrastructure...

  • Article
  • Open Access
2 Citations
3,589 Views
21 Pages

12 August 2022

Cyber physical systems (CPSs) are found in many aspects of daily life, and they control and protect energy production, manufacturing and even healthcare. Due to long lifecycles and the use of legacy technologies, its associated security comes with ma...

  • Review
  • Open Access
7 Citations
3,090 Views
26 Pages

19 February 2025

Smart grid reliability and efficiency are critical for uninterrupted service, especially amidst growing demand and network complexity. Wide-Area Measurement Systems (WAMS) are valuable tools for mitigating faults and reducing fault-clearing time whil...

  • Article
  • Open Access
1 Citations
3,167 Views
21 Pages

Quantifying Cyber Resilience: A Framework Based on Availability Metrics and AUC-Based Normalization

  • Harksu Cho,
  • Ji-Hyun Sung,
  • Hye-Jin Kang,
  • Jisoo Jang and
  • Dongkyoo Shin

This study presents a metric selection framework and a normalization method for the quantitative assessment of cyber resilience, with a specific focus on availability as a core dimension. To develop a generalizable evaluation model, service types fro...

  • Article
  • Open Access
22 Citations
9,129 Views
16 Pages

In this paper, insights are provided into how senior managers can establish a global cyber security model that raises cyber security awareness among staff in a partnership arrangement and ensures that cyber attacks are anticipated and dealt with in r...

  • Article
  • Open Access
52 Citations
8,688 Views
19 Pages

Managing Cyber Security Risks of the Cyber-Enabled Ship

  • Georgios Kavallieratos and
  • Sokratis Katsikas

30 September 2020

One aspect of the digital transformation process in the shipping industry, a process often referred to as Shipping 4.0, is the increased digitization of on board systems that goes along with increased automation in and autonomy of the vessel. This is...

  • Review
  • Open Access
2,619 Views
30 Pages

A Systematic Literature Review on AI-Based Cybersecurity in Nuclear Power Plants

  • Marianna Lezzi,
  • Luigi Martino,
  • Ernesto Damiani and
  • Chan Yeob Yeun

Cybersecurity management plays a key role in preserving the operational security of nuclear power plants (NPPs), ensuring service continuity and system resilience. The growing number of sophisticated cyber-attacks against NPPs requires cybersecurity...

  • Article
  • Open Access
24 Citations
13,655 Views
27 Pages

Perspectives on Cyber Security for Offshore Oil and Gas Assets

  • Iosif Progoulakis,
  • Nikitas Nikitakos,
  • Paul Rohmeyer,
  • Barry Bunin,
  • Dimitrios Dalaklis and
  • Stavros Karamperidis

In an ever-evolving technological industry, the oil and gas sector is already moving forward through the adaptation of Industry 4.0 and the adaptation of advanced cyber technologies through Oil and Gas 4.0. As IT/OT (information technology/operationa...

  • Article
  • Open Access
2 Citations
3,164 Views
24 Pages

Cyber–Physical Security Assessment for Maritime Vessels: Study on Drillship DP System Using American Petroleum Institute Security Risk Analysis and Bow-Tie Analysis

  • Iosif Progoulakis,
  • Ioannis K. Dagkinis,
  • Anastasia Dimakopoulou,
  • Theodoros Lilas,
  • Nikitas Nikitakos and
  • Panagiotis M. Psomas

4 October 2024

The maritime industry’s increasing integration of IT/OT systems into vessel operations has significantly elevated its exposure to cyber–physical threats, making the development of effective cyber risk management strategies a necessity. Th...

  • Article
  • Open Access
7 Citations
2,761 Views
15 Pages

28 September 2023

The comprehensive system of information security of an enterprise includes both tactical aspects of information and strategic priorities, reflecting the information policy and information strategy of the enterprise. Ensuring a given level of cybersec...

  • Article
  • Open Access
2 Citations
4,221 Views
24 Pages

23 October 2024

At the Group of Seven (G7) summit held on 13–15 June in 2024, the Group’s leaders committed to establishing a collective cyber security framework and reinforcing the work of the cyber security working group to manage the risks targeting e...

  • Article
  • Open Access
7 Citations
4,773 Views
30 Pages

A Cyber Risk Assessment Approach to Federated Identity Management Framework-Based Digital Healthcare System

  • Shamsul Huda,
  • Md. Rezaul Islam,
  • Jemal Abawajy,
  • Vinay Naga Vamsi Kottala and
  • Shafiq Ahmad

15 August 2024

This paper presents a comprehensive and evidence-based cyber-risk assessment approach specifically designed for Medical Cyber Physical Systems (MCPS)- and Internet-of-Medical Devices (IoMT)-based collaborative digital healthcare systems, which levera...

  • Article
  • Open Access
5 Citations
9,245 Views
62 Pages

For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event. However, the cyber-insurance market suffers from the problem of information asymmetry, l...

  • Review
  • Open Access
16 Citations
6,599 Views
18 Pages

31 December 2022

Cybersecurity risks have become obstinate problems for critical water infrastructure management in Australia and worldwide. Water management in Australia involves a vast complex of smart technical control systems interconnected with several networks,...

of 8