You are currently viewing a new version of our website. To view the old version click .

725 Results Found

  • Article
  • Open Access
5 Citations
4,435 Views
14 Pages

25 August 2023

Cyber security importance has escalated globally, driven by its pivotal role in shaping daily life, encompassing both personal and non-personal aspects. Cyber security breach probability functions play a crucial role in comprehending how cyber securi...

  • Article
  • Open Access
4 Citations
6,590 Views
29 Pages

With the continuous expansion of air traffic flow, the increasingly serious aviation network security threats have a significant and far-reaching impact on the safe operation of the aviation industry. The networked air traffic management (ATM) system...

  • Article
  • Open Access
108 Citations
31,628 Views
29 Pages

An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System

  • Halima Ibrahim Kure,
  • Shareeful Islam and
  • Mohammad Abdur Razzaque

30 May 2018

A cyber-physical system (CPS) is a combination of physical system components with cyber capabilities that have a very tight interconnectivity. CPS is a widely used technology in many applications, including electric power systems, communications, and...

  • Review
  • Open Access
39 Citations
9,099 Views
33 Pages

Cyber-Physical Cloud Battery Management Systems: Review of Security Aspects

  • Farshid Naseri,
  • Zahra Kazemi,
  • Peter Gorm Larsen,
  • Mohammad Mehdi Arefi and
  • Erik Schaltz

Battery management systems (BMSs) are critical to ensure the efficiency and safety of high-power battery energy storage systems (BESSs) in vehicular and stationary applications. Recently, the proliferation of battery big data and cloud computing adva...

  • Article
  • Open Access
9 Citations
5,364 Views
16 Pages

Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures

  • Noritaka Matsumoto,
  • Junya Fujita,
  • Hiromichi Endoh,
  • Tsutomu Yamada,
  • Kenji Sawada and
  • Osamu Kaneko

8 November 2021

Cyber-security countermeasures are important for IIoT (industrial Internet of things) systems in which IT (information technology) and OT (operational technology) are integrated. The appropriate asset management is the key to creating strong security...

  • Article
  • Open Access
20 Citations
8,577 Views
25 Pages

Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers

  • Sander Zeijlemaker,
  • Etiënne A. J. A. Rouwette,
  • Giovanni Cunico,
  • Stefano Armenia and
  • Michael von Kutzschenbach

14 April 2022

Cyber-security incidents show how difficult it is to make optimal strategic decisions in such a complex environment. Given that it is hard for researchers to observe organisations’ decision-making processes driving cyber-security strategy, we d...

  • Article
  • Open Access
9 Citations
5,445 Views
32 Pages

24 October 2024

In response to the escalating threats of cybersecurity attacks and breaches, ensuring the development and deployment of secure IT products has become paramount for organizations in their cybersecurity transformation. This work emphasizes the critical...

  • Review
  • Open Access
211 Citations
44,384 Views
21 Pages

18 September 2020

Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protecti...

  • Article
  • Open Access
2 Citations
1,703 Views
22 Pages

Intelligent Energy Management Systems in Industry 5.0: Cybersecurity Applications in Examples

  • Barbara Wyrzykowska,
  • Hubert Szczepaniuk,
  • Edyta Karolina Szczepaniuk,
  • Anna Rytko and
  • Marzena Kacprzak

22 November 2024

The article examines modern approaches to energy management in the context of the development of Industry 5.0 with a particular focus on cybersecurity. Key tenets of Industry 5.0 are discussed, including the integration of advanced technologies with...

  • Article
  • Open Access
4 Citations
11,192 Views
25 Pages

An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure

  • Habib El Amin,
  • Abed Ellatif Samhat,
  • Maroun Chamoun,
  • Lina Oueidat and
  • Antoine Feghali

Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strat...

  • Article
  • Open Access
15 Citations
4,666 Views
28 Pages

12 January 2021

Investments in security and cyber-insurance are two cyber-risk management strategies that can be employed together to optimize the overall security expense. In this paper, we provide a closed form for the optimal investment under a full set of insura...

  • Article
  • Open Access
53 Citations
35,870 Views
20 Pages

10 May 2023

Cyber threats are attempts to secure unauthorized access to, change, or delete private information, to demand money from victims, or to disrupt business. Cybercrime includes everything from identity theft, malware threats, email and online fraud, to...

  • Review
  • Open Access
32 Citations
7,555 Views
37 Pages

Intelligent Buildings in Smart Grids: A Survey on Security and Privacy Issues Related to Energy Management

  • Alvaro Llaria,
  • Jessye Dos Santos,
  • Guillaume Terrasson,
  • Zina Boussaada,
  • Christophe Merlo and
  • Octavian Curea

10 May 2021

During the last decade, the smart grid (SG) concept has started to become a reality, mainly thanks to the technical progress achieved in telecommunications, informatics and power electronics, among other domains, leading to an evolution of the tradit...

  • Article
  • Open Access
11 Citations
6,232 Views
29 Pages

24 January 2022

Background: Cyber security has turned out to be one of the main challenges of recent years. As the variety of system and application vulnerabilities has increased dramatically in recent years, cyber attackers have managed to penetrate the networks an...

  • Article
  • Open Access
4 Citations
2,955 Views
18 Pages

13 September 2024

This study aimed to strengthen the security of autonomous vehicles by analyzing the current status of autonomous vehicle security, such as autonomous vehicle features, security threats, and compliance, and deriving security-level check items. Based o...

  • Review
  • Open Access
2,106 Views
30 Pages

A Systematic Literature Review on AI-Based Cybersecurity in Nuclear Power Plants

  • Marianna Lezzi,
  • Luigi Martino,
  • Ernesto Damiani and
  • Chan Yeob Yeun

Cybersecurity management plays a key role in preserving the operational security of nuclear power plants (NPPs), ensuring service continuity and system resilience. The growing number of sophisticated cyber-attacks against NPPs requires cybersecurity...

  • Article
  • Open Access
6 Citations
2,679 Views
32 Pages

Enhancing the Efficiency of a Cybersecurity Operations Center Using Biomimetic Algorithms Empowered by Deep Q-Learning

  • Rodrigo Olivares,
  • Omar Salinas,
  • Camilo Ravelo,
  • Ricardo Soto and
  • Broderick Crawford

In the complex and dynamic landscape of cyber threats, organizations require sophisticated strategies for managing Cybersecurity Operations Centers and deploying Security Information and Event Management systems. Our study enhances these strategies b...

  • Article
  • Open Access
47 Citations
5,712 Views
21 Pages

Secure Healthcare Record Sharing Mechanism with Blockchain

  • Ghulam Qadar Butt,
  • Toqeer Ali Sayed,
  • Rabia Riaz,
  • Sanam Shahla Rizvi and
  • Anand Paul

23 February 2022

The transfer of information is a demanding issue, particularly due to the presence of a large number of eavesdroppers on communication channels. Sharing medical service records between different clinical jobs is a basic and testing research topic. Th...

  • Article
  • Open Access
4 Citations
3,727 Views
21 Pages

1 February 2025

This study aims to describe and assess the impact of critical infrastructure (CI) cybersecurity issues on the sustainable development of smart cities. This study highlights the integration of PayTech systems into the broader CI landscape, highlightin...

  • Article
  • Open Access
22 Citations
5,494 Views
20 Pages

Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with soci...

  • Review
  • Open Access
57 Citations
12,561 Views
16 Pages

Cyber Risk in Health Facilities: A Systematic Literature Review

  • Alberto Sardi,
  • Alessandro Rizzi,
  • Enrico Sorano and
  • Anna Guerrieri

27 August 2020

The current world challenges include issues such as infectious disease pandemics, environmental health risks, food safety, and crime prevention. Through this article, a special emphasis is given to one of the main challenges in the healthcare sector...

  • Article
  • Open Access
1 Citations
5,946 Views
21 Pages

With ongoing cyber threats stemming from persistent hacking attempts, relentless efforts are being made to prevent such threats at their source. Recently, the concept of “zero trust”, introduced by the United States National Institute of...

  • Article
  • Open Access
18 Citations
7,967 Views
12 Pages

18 October 2021

The aim of this paper is to deepen the application of value at risk in the cyber domain, with particular attention to its potential role in security investment valuation. Cyber risk is a fundamental component of the overall risk faced by any organiza...

  • Article
  • Open Access
7 Citations
3,980 Views
31 Pages

Boosting Holistic Cybersecurity Awareness with Outsourced Wide-Scope CyberSOC: A Generalization from a Spanish Public Organization Study

  • Manuel Domínguez-Dorado,
  • Francisco J. Rodríguez-Pérez,
  • Javier Carmona-Murillo,
  • David Cortés-Polo and
  • Jesús Calle-Cancho

25 October 2023

Public sector organizations are facing an escalating challenge with the increasing volume and complexity of cyberattacks, which disrupt essential public services and jeopardize citizen data and privacy. Effective cybersecurity management has become a...

  • Article
  • Open Access
6 Citations
2,580 Views
16 Pages

Fast, Lightweight, and Efficient Cybersecurity Optimization for Tactical–Operational Management

  • Manuel Domínguez-Dorado,
  • David Cortés-Polo,
  • Javier Carmona-Murillo,
  • Francisco J. Rodríguez-Pérez and
  • Jesús Galeano-Brajones

22 May 2023

The increase in frequency and complexity of cyberattacks has heightened concerns regarding cybersecurity and created an urgent need for organizations to take action. To effectively address this challenge, a comprehensive and integrated approach is re...

  • Article
  • Open Access
1 Citations
3,526 Views
22 Pages

Internal Audit Strategies for Assessing Cybersecurity Controls in the Brazilian Financial Institutions

  • Lucas Vinicius Andrade Ferreira,
  • Carlos André de Melo Alves,
  • Laerte Peotta de Melo and
  • Rafael Rabelo Nunes

20 May 2025

The global financial sector’s accelerating digitalization, propelled by the growing demand for rapid and tailored services, is increasingly vulnerable to complex cyber threats. This vulnerability underscores the critical need for comprehensive...

  • Review
  • Open Access
11 Citations
9,858 Views
32 Pages

1 November 2024

As the digital environment progresses, the complexities of cyber threats also advance, encompassing both hostile cyberattacks and sophisticated cyber espionage. In the face of these difficulties, cooperative endeavours between state and non-state act...

  • Article
  • Open Access
11 Citations
11,246 Views
16 Pages

13 April 2022

In this study, a framework was developed, based on a literature review, to help managers incorporate cybersecurity risk management in agile development projects. The literature review used predefined codes that were developed by extending previously...

  • Article
  • Open Access
1 Citations
2,456 Views
18 Pages

As cyber threats escalate in scale and sophistication, the imperative to secure public data through theoretically grounded and practically viable frameworks becomes increasingly urgent. This review investigates whether and how criminology theories ha...

  • Article
  • Open Access
10 Citations
4,142 Views
44 Pages

A Survey on Cyber Risk Management for the Internet of Things

  • Emily Kate Parsons,
  • Emmanouil Panaousis,
  • George Loukas and
  • Georgia Sakellari

7 August 2023

The Internet of Things (IoT) continues to grow at a rapid pace, becoming integrated into the daily operations of individuals and organisations. IoT systems automate crucial services within daily life that users may rely on, which makes the assurance...

  • Proceeding Paper
  • Open Access
2 Citations
1,159 Views
4 Pages

11 September 2023

Due to the augmented engrossment of technology in security, everything moves towards a cohesive system. Smart cyber-lock technology is one of the eminent concepts with the potential to solve emerging safety and security issues. This work aims to esta...

  • Article
  • Open Access
2 Citations
4,960 Views
23 Pages

Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study

  • Giseok Jeong,
  • Kookjin Kim,
  • Sukjoon Yoon,
  • Dongkyoo Shin and
  • Jiwon Kang

12 October 2023

As the world undergoes rapid digitalization, individuals and objects are becoming more extensively connected through the advancement of Internet networks. This phenomenon has been observed in governmental and military domains as well, accompanied by...

  • Article
  • Open Access
3 Citations
2,343 Views
15 Pages

Adaptive Management of Multi-Scenario Projects in Cybersecurity: Models and Algorithms for Decision-Making

  • Vadim Tynchenko,
  • Alexander Lomazov,
  • Vadim Lomazov,
  • Dmitry Evsyukov,
  • Vladimir Nelyub,
  • Aleksei Borodulin,
  • Andrei Gantimurov and
  • Ivan Malashin

In recent years, cybersecurity management has increasingly required advanced methodologies capable of handling complex, evolving threat landscapes. Scenario network-based approaches have emerged as effective strategies for managing uncertainty and ad...

  • Article
  • Open Access
2 Citations
6,227 Views
27 Pages

Integrated Attack Tree in Residual Risk Management Framework

  • Ahmed Nawaz Khan,
  • Jeremy Bryans,
  • Giedre Sabaliauskaite and
  • Hesamaldin Jadidbonab

29 November 2023

Safety-critical cyber-physical systems (CPSs), such as high-tech cars having cyber capabilities, are highly interconnected. Automotive manufacturers are concerned about cyber attacks on vehicles that can lead to catastrophic consequences. There is a...

  • Review
  • Open Access
12 Citations
3,269 Views
23 Pages

13 June 2023

On 28 February–2 March 2023, the 2023 States General of Artificial Intelligence (AI) event was held in Italy under the sponsorship of several multinational companies. The purpose of this event was mainly to create a venue for allowing international p...

  • Review
  • Open Access
16 Citations
6,390 Views
18 Pages

31 December 2022

Cybersecurity risks have become obstinate problems for critical water infrastructure management in Australia and worldwide. Water management in Australia involves a vast complex of smart technical control systems interconnected with several networks,...

  • Article
  • Open Access
33 Citations
18,087 Views
23 Pages

19 April 2021

The evaluation of data breaches and cybersecurity risks has not yet been formally addressed in modern business systems. There has been a tremendous increase in the generation, usage and consumption of industrial and business data as a result of smart...

  • Article
  • Open Access
6 Citations
4,771 Views
18 Pages

Generative AI-Enhanced Cybersecurity Framework for Enterprise Data Privacy Management

  • Geeta Sandeep Nadella,
  • Santosh Reddy Addula,
  • Akhila Reddy Yadulla,
  • Guna Sekhar Sajja,
  • Mohan Meesala,
  • Mohan Harish Maturi,
  • Karthik Meduri and
  • Hari Gonaygunta

8 February 2025

This study presents a Generative AI-Enhanced Cybersecurity Framework designed to strengthen enterprise data privacy management while improving threat detection accuracy and scalability. By leveraging Generative Adversarial Networks (GANs), Variationa...

  • Article
  • Open Access
1 Citations
3,368 Views
22 Pages

18 December 2024

In the 4th industrial era, the proliferation of interconnected smart devices and advancements in AI, particularly big data and machine learning, have integrated various industrial domains into cyberspace. This convergence brings novel security threat...

  • Article
  • Open Access
5 Citations
2,892 Views
20 Pages

28 December 2023

With the advancement of IT technology, intelligent devices such as autonomous vehicles, unmanned equipment, and drones are rapidly evolving. Consequently, the proliferation of defense systems based on these technologies is increasing worldwide. In re...

  • Article
  • Open Access
4 Citations
6,171 Views
36 Pages

27 August 2021

Cyberattacks make the news daily. Systems must be appropriately secured. Cybersecurity risk analyses are more than ever necessary, but… traveling and gathering in a room to discuss the topic has become difficult due to the COVID, whilst having a cybe...

  • Article
  • Open Access
8 Citations
5,500 Views
26 Pages

riskAIchain: AI-Driven IT Infrastructure—Blockchain-Backed Approach for Enhanced Risk Management

  • Mir Mehedi Rahman,
  • Bishwo Prakash Pokharel,
  • Sayed Abu Sayeed,
  • Sujan Kumar Bhowmik,
  • Naresh Kshetri and
  • Nafiz Eashrak

19 December 2024

In the evolving landscape of cybersecurity, traditional information technology (IT) infrastructures often struggle to meet the demands of modern risk management frameworks, which require enhanced security, scalability, and analytical capabilities. Th...

  • Article
  • Open Access
1,031 Views
17 Pages

15 September 2025

Cybersecurity has become a critical concern in the automotive sector, where the increasing connectivity and complexity of modern vehicles—particularly in the context of autonomous driving—have significantly expanded the attack surface. In...

  • Article
  • Open Access
73 Citations
7,909 Views
29 Pages

Incorporation of Blockchain Technology for Different Smart Grid Applications: Architecture, Prospects, and Challenges

  • Muhammad Waseem,
  • Muhammad Adnan Khan,
  • Arman Goudarzi,
  • Shah Fahad,
  • Intisar Ali Sajjad and
  • Pierluigi Siano

11 January 2023

Smart grid integrates computer, communication, and sensing technologies into existing power grid networks to achieve significant informatization-related advantages. It will provide communication between neighbors, localized management, bidirectional...

  • Review
  • Open Access
74 Citations
12,859 Views
19 Pages

Cybersecurity in the Internet of Things in Industrial Management

  • Ricardo Jorge Raimundo and
  • Albérico Travassos Rosário

2 February 2022

Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infras...

  • Article
  • Open Access
60 Citations
19,508 Views
14 Pages

12 April 2022

Cybersecurity threats have grown exponentially, posing a heavy burden on organisations. Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity issues are receiving greater attention. However, existing research on cy...

  • Article
  • Open Access
1 Citations
1,258 Views
24 Pages

Enhancing Smart Grid Reliability Through Data-Driven Optimisation and Cyber-Resilient EV Integration

  • Muhammed Cavus,
  • Huseyin Ayan,
  • Mahmut Sari,
  • Osman Akbulut,
  • Dilum Dissanayake and
  • Margaret Bell

25 August 2025

This study presents a novel cyber-resilient, data-driven optimisation framework for real-time energy management in electric vehicle (EV)-integrated smart grids. The proposed framework integrates a hybrid optimisation engine—combining genetic al...

  • Article
  • Open Access
1,152 Views
26 Pages

1 July 2025

Ensuring cybersecurity and health management is a fundamental requirement in modern chemical industry plants operating under the Industry 4.0 framework. Traditionally, these two concerns have been addressed independently, despite sharing multiple und...

  • Article
  • Open Access
408 Views
28 Pages

Integrating the CRA into the IoT Lifecycle: Challenges, Strategies, and Best Practices

  • Miguel Ángel Ortega Velázquez,
  • Iris Cuevas Martínez and
  • Antonio J. Jara

22 November 2025

The European Union’s Cyber Resilience Act (CRA) introduces a complex set of binding lifecycle security obligations, presenting a significant compliance challenge for the Internet of Things (IoT) industry. This study addresses this challenge by...

  • Article
  • Open Access
2 Citations
4,032 Views
30 Pages

15 September 2023

The issue of Automated Meter Management (AMM), an integral part of modern energy smart grid systems, has become a hot topic in recent years. With the current energy crisis, and given the new approaches to smart energy and its regulation, implemented...

of 15