Skip Content
You are currently on the new version of our website. Access the old version .

39,915 Results Found

  • Article
  • Open Access
3 Citations
1,916 Views
25 Pages

31 October 2024

Property-driven hardware verification provides a promising way to uncover design vulnerabilities. However, developing security properties that check for highly concealed security vulnerabilities remains a significant challenge. In this paper, we prop...

  • Article
  • Open Access
21 Citations
9,582 Views
21 Pages

Information security has been predicted as a barrier for future sustainable computing. Regarding information security of secure sustainable computing, the role of information security managers has received attention. In particular, transformational l...

  • Article
  • Open Access
11 Citations
4,523 Views
26 Pages

IoT Security Configurability with Security-by-Contract

  • Alberto Giaretta,
  • Nicola Dragoni and
  • Fabio Massacci

23 September 2019

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure defau...

  • Article
  • Open Access
4 Citations
3,945 Views
21 Pages

29 August 2023

In this paper, we are interested in assessing the different environmental security concepts, policies, and actions of actors involved in the Common Security and Defence Policy (CSDP). Through exploratory qualitative research, we interviewed key stake...

  • Article
  • Open Access
3 Citations
4,729 Views
26 Pages

14 January 2025

The rapid advancement of technology and increasing data utilisation have underscored the need for new models to manage and secure big data effectively. However, the constraints of isolated network environments and the limitations of existing security...

  • Article
  • Open Access
15 Citations
5,075 Views
21 Pages

Zero-trust security architecture reconstructs the trust foundation of access control based on authentication and authorization by continuously authenticating the terminal during the authentication process and not relying solely on geographic location...

  • Article
  • Open Access
3 Citations
4,244 Views
28 Pages

A Security Analysis Method for Security Protocol Implementations Based on Message Construction

  • Jintian Lu,
  • Lili Yao,
  • Xudong He,
  • Chintser Huang,
  • Dejun Wang and
  • Bo Meng

8 December 2018

Security protocols are integral to the protection of cyberspace against malicious attacks. Therefore, it is important to be confident in the security of a security protocol. In previous years, people have worked on security of security protocol abstr...

  • Feature Paper
  • Article
  • Open Access
4 Citations
8,225 Views
21 Pages

Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS

  • Shinelle Hutchinson,
  • Miloš Stanković,
  • Samuel Ho,
  • Shiva Houshmand and
  • Umit Karabiyik

The emergence of the Internet of Things technologies and the increase and convenience of smart home devices have contributed to the growth of self-installed home security systems. While home security devices have become more accessible and can help u...

  • Article
  • Open Access
9 Citations
3,448 Views
19 Pages

15 March 2021

This study empirically investigates the influence of information security marketing and response cost on employees’ information security intention in the container shipping industry. Survey data were collected from 285 respondents in Taiwan. Explorat...

  • Article
  • Open Access
18 Citations
11,041 Views
27 Pages

The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets

  • Antonio Santos-Olmo,
  • Luis Enrique Sánchez,
  • Ismael Caballero,
  • Sara Camacho and
  • Eduardo Fernandez-Medina

The information society is increasingly more dependent on Information Security Management Systems (ISMSs), and the availability of these kinds of systems is now vital for the development of Small and Medium-Sized Enterprises (SMEs). However, these co...

  • Article
  • Open Access
18 Citations
6,730 Views
16 Pages

In order to build an efficient security architecture, previous studies have attempted to understand complex system architectures and message flows to detect various attack packets. However, the existing hardware-based single security architecture can...

  • Article
  • Open Access
10 Citations
5,352 Views
19 Pages

10 August 2022

Security assurance (SA) is a technique that helps organizations to appraise the trust and confidence that a system can be operated correctly and securely. To foster effective SA, there must be systematic techniques to reflect the fact that the system...

  • Article
  • Open Access
8 Citations
3,989 Views
11 Pages

17 July 2019

An approach for security enhancement of a class of encryption schemes is pointed out and its security is analyzed. The approach is based on certain results of coding and information theory regarding communication channels with erasures and deletion e...

  • Review
  • Open Access
57 Citations
17,112 Views
35 Pages

Energy Security: A Conceptual Overview

  • Jacek Strojny,
  • Anna Krakowiak-Bal,
  • Jarosław Knaga and
  • Piotr Kacorzyk

29 June 2023

In a dynamically changing socio-economic environment with significant technical and technological progress, the notion of energy security takes on a new, broader meaning. Modern literature presents a variety of operational definitions of energy secur...

  • Article
  • Open Access
49 Citations
7,767 Views
29 Pages

The Place of Energy Security in the National Security Framework: An Assessment Approach

  • Daniel Mara,
  • Silviu Nate,
  • Andriy Stavytskyy and
  • Ganna Kharlamova

17 January 2022

The term “energy security” is used almost everywhere in economic and political discussions related to energy supply. However, different authors use different meanings to express the concept of energy security. Quite often, this term is us...

  • Article
  • Open Access
23 Citations
21,059 Views
28 Pages

The Cloud is fast becoming a popular platform for SaaS, a popular software delivery model. This is because the Cloud has many advantages over the traditional private infrastructure, such as increased flexibility, no maintenance, less management burde...

  • Article
  • Open Access
4 Citations
2,695 Views
16 Pages

Since it affects a nation’s economy and people’s wellbeing, food security is a crucial national security requirement. In order to realize multi-angle grain data presentation and analysis and achieve the goal of deep mining, we propose a 3...

  • Article
  • Open Access
1 Citations
2,722 Views
23 Pages

8 April 2021

Non-interactive zero-knowledge (NIZK) proofs for chosen-ciphertext security are generally considered to give an impractical construction. An interesting recent work by Seo, Abdalla, Lee, and Park (Information Sciences, July 2019) proposed an efficien...

  • Article
  • Open Access
4 Citations
6,320 Views
16 Pages

Defining the Minimum Security Baseline in a Multiple Security Standards Environment by Graph Theory Techniques

  • Dmitrij Olifer,
  • Nikolaj Goranin,
  • Antanas Cenys,
  • Arnas Kaceniauskas and
  • Justinas Janulevicius

17 February 2019

One of the best ways to protect an organization’s assets is to implement security requirements defined by different standards or best practices. However, such an approach is complicated and requires specific skills and knowledge. In case an org...

  • Article
  • Open Access
2 Citations
4,145 Views
28 Pages

26 March 2025

In recent years, the rapid growth of cryptocurrency markets has highlighted the urgent need for advanced security solutions capable of addressing a spectrum of unique threats, from phishing and wallet hacks to complex blockchain vulnerabilities. This...

  • Discussion
  • Open Access
43 Citations
8,636 Views
15 Pages

Soil Security for Australia

  • John McLean Bennett,
  • Alex McBratney,
  • Damien Field,
  • Darren Kidd,
  • Uta Stockmann,
  • Craig Liddicoat and
  • Samantha Grover

21 June 2019

Soil Security is an emerging sustainability science concept with global application for guiding integrated approaches to land management, while balancing ecosystem services, environmental, social, cultural, and economic imperatives. This discussion p...

  • Article
  • Open Access
8 Citations
3,203 Views
13 Pages

Security Ontology Structure for Formalization of Security Document Knowledge

  • Simona Ramanauskaitė,
  • Anatoly Shein,
  • Antanas Čenys and
  • Justinas Rastenis

Cybersecurity solutions are highly based on data analysis. Currently, it is not enough to make an automated decision; it also has to be explainable. The decision-making logic traceability should be provided in addition to justification by referencing...

  • Article
  • Open Access
27 Citations
9,907 Views
20 Pages

13 December 2021

The increasing number of cyber-attacks has become a serious threat to organizations, organizations that are not prepared to face cyber-attacks on their organizational resources will experience huge losses and reduce organizational performance. It is...

  • Article
  • Open Access
14 Citations
11,973 Views
21 Pages

BYOD Security: A Study of Human Dimensions

  • Kathleen Downer and
  • Maumita Bhattacharya

The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID-19 pandemi...

  • Article
  • Open Access
233 Citations
49,369 Views
35 Pages

Cloud Computing Security: A Survey

  • Issa M. Khalil,
  • Abdallah Khreishah and
  • Muhammad Azeem

3 February 2014

Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable compu...

  • Article
  • Open Access
12 Citations
4,974 Views
16 Pages

Security Information Sharing in Smart Grids: Persisting Security Audits to the Blockchain

  • Andrés Marín-López,
  • Sergio Chica-Manjarrez,
  • David Arroyo,
  • Florina Almenares-Mendoza and
  • Daniel Díaz-Sánchez

6 November 2020

With the transformation in smart grids, power grid companies are becoming increasingly dependent on data networks. Data networks are used to transport information and commands for optimizing power grid operations: Planning, generation, transportation...

  • Review
  • Open Access
17 Citations
16,697 Views
19 Pages

Usable Security: A Systematic Literature Review

  • Francesco Di Nocera,
  • Giorgia Tempestini and
  • Matteo Orsini

30 November 2023

Usable security involves designing security measures that accommodate users’ needs and behaviors. Balancing usability and security poses challenges: the more secure the systems, the less usable they will be. On the contrary, more usable systems...

  • Article
  • Open Access
2 Citations
2,044 Views
26 Pages

Multiple Linear-Combination Security Network Coding

  • Yang Bai,
  • Xuan Guang and
  • Raymond W. Yeung

28 July 2023

In this paper, we put forward the model of multiple linear-combination security multicast network coding, where the wiretapper desires to obtain some information about a predefined set of multiple linear combinations of the source symbols by eavesdro...

  • Article
  • Open Access
5 Citations
3,154 Views
18 Pages

13 September 2024

This study aimed to strengthen the security of autonomous vehicles by analyzing the current status of autonomous vehicle security, such as autonomous vehicle features, security threats, and compliance, and deriving security-level check items. Based o...

  • Review
  • Open Access
1,694 Views
23 Pages

Security Requirements Engineering: A Review and Analysis

  • Aftab Alam Janisar,
  • Ayman Meidan,
  • Khairul Shafee bin Kalid,
  • Abdul Rehman Gilal and
  • Aliza Bt Sarlan

9 October 2025

Security is crucial, especially as software systems become increasingly complex. Both practitioners and researchers advocate for the early integration of security requirements (SR) into the Software Development Life Cycle (SDLC). However, ensuring th...

  • Feature Paper
  • Article
  • Open Access
1 Citations
3,937 Views
24 Pages

On the Security of the Dandelion Protocol

  • Brian Goncalves and
  • Atefeh Mashatan

25 March 2022

In this paper, we review the peer-to-peer blockchain transaction protocol, Dandelion, and develop an oracle-based model for its network and security. We formalize a series of security and functional criteria, such as unforgeability, non-repudiation,...

  • Article
  • Open Access
16 Citations
1,328 Views
11 Pages

High growth of smartphones and tablets usage has brought enormous rise in the use of newer form of electronic banking - Smart Banking, nowadays. This form of e-banking is suitable for small businessmen or private usage and its usage increases with th...

  • Review
  • Open Access
191 Citations
19,146 Views
43 Pages

Security Requirements and Challenges of 6G Technologies and Applications

  • Shimaa A. Abdel Hakeem,
  • Hanan H. Hussein and
  • HyungWon Kim

2 March 2022

After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enabling hyper-...

  • Article
  • Open Access
3 Citations
3,340 Views
11 Pages

The Perception of Security and Youth: A Practical Example

  • María Vílchez and
  • Francisco Trujillo

11 April 2023

This investigation presents the perspective that Spanish postgraduate students have on security. The data compiled here encompass the results of a research study involving Spanish Master’s students with backgrounds in international law and inte...

  • Article
  • Open Access
30 Citations
8,385 Views
13 Pages

Security Awareness of the Digital Natives

  • Vasileios Gkioulos,
  • Gaute Wangen,
  • Sokratis K. Katsikas,
  • George Kavallieratos and
  • Panayiotis Kotzanikolaou

Young generations make extensive use of mobile devices, such as smartphones, tablets and laptops, while a plethora of security risks associated with such devices are induced by vulnerabilities related to user behavior. Furthermore, the number of secu...

  • Article
  • Open Access
5 Citations
1,206 Views
7 Pages

As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increasingly relevant role. In many cases security in universities is approac...

  • Article
  • Open Access
16 Citations
4,561 Views
26 Pages

Towards Optimized Security Attributes for IoT Devices in Smart Agriculture Based on the IEC 62443 Security Standard

  • Abdelkader Magdy Shaaban,
  • Sebastian Chlup,
  • Nahla El-Araby and
  • Christoph Schmittner

2 June 2022

Implementing applicable security measures into system engineering applications is still one of the most challenging processes in building secure infrastructure. This process needs to consider a variety of security attributes to support securing syste...

  • Review
  • Open Access
13 Citations
8,029 Views
21 Pages

3 March 2021

The rise of urban populations has rendered cities in both developed and developing countries vulnerable to poor health and diseases that are associated with urban living conditions and environments. Therefore, there is a growing consensus that while...

  • Article
  • Open Access
7 Citations
11,670 Views
19 Pages

A Layered Trust Information Security Architecture

  • Robson De Oliveira Albuquerque,
  • Luis Javier García Villalba,
  • Ana Lucila Sandoval Orozco,
  • Fábio Buiati and
  • Tai-Hoon Kim

1 December 2014

Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk managem...

  • Article
  • Open Access
13 Citations
3,818 Views
14 Pages

Several studies have found that trust in government is associated with social fairness, citizens’ satisfaction with public service, and life satisfaction. This study aimed to investigate the serial mediation effects of social security satisfact...

  • Article
  • Open Access
1 Citations
3,391 Views
35 Pages

15 December 2021

The need for continuous monitoring of physiological information of critical organs of the human body, combined with the ever-growing field of electronics and sensor technologies and the vast opportunities brought by 5G connectivity, have made implant...

  • Article
  • Open Access
56 Citations
22,512 Views
28 Pages

Water Security in the Syr Darya Basin

  • Kai Wegerich,
  • Daniel Van Rooijen,
  • Ilkhom Soliev and
  • Nozilakhon Mukhamedova

27 August 2015

The importance of water security has gained prominence on the international water agenda, but the focus seems to be directed towards water demand. An essential element of water security is the functioning of public organizations responsible for water...

  • Article
  • Open Access
48 Citations
11,579 Views
24 Pages

Cyber Physical Systems Security for Maritime Assets

  • Iosif Progoulakis,
  • Paul Rohmeyer and
  • Nikitas Nikitakos

5 December 2021

The integration of IT, OT, and human factor elements in maritime assets is critical for their efficient and safe operation and performance. This integration defines cyber physical systems and involves a number of IT and OT components, systems, and fu...

  • Article
  • Open Access
34 Citations
14,571 Views
24 Pages

On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications

  • Francesc Mateo Tudela,
  • Juan-Ramón Bermejo Higuera,
  • Javier Bermejo Higuera,
  • Juan-Antonio Sicilia Montalvo and
  • Michael I. Argyros

20 December 2020

The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they are designed for. In addition,...

  • Article
  • Open Access
8 Citations
6,457 Views
33 Pages

On the Need for a General REST-Security Framework

  • Luigi Lo Iacono,
  • Hoai Viet Nguyen and
  • Peter Leo Gorski

27 February 2019

Contemporary software is inherently distributed. The principles guiding the design of such software have been mainly manifested by the service-oriented architecture (SOA) concept. In a SOA, applications are orchestrated by software services generally...

  • Article
  • Open Access
2 Citations
5,730 Views
22 Pages

A Comprehensive Security Framework Proposal to Contribute to Sustainability

  • Javier Espinosa García,
  • Luis Hernández Encinas and
  • Alberto Peinado Domínguez

18 June 2021

Well-known international security frameworks try to eliminate or mitigate different kinds of risks on the assets covered by their scopes (e.g., people, goods, information, and reputation). To date, to the best of our knowledge, any of these approache...

  • Article
  • Open Access
3 Citations
7,124 Views
32 Pages

11 November 2022

Throughout the past few years, the oil and gas industry in the United Arab Emirates has grown significantly, and is currently one of the top ten oil producers in the world. As a result, it is at risk of physical security threats, including theft, una...

  • Article
  • Open Access
2 Citations
2,375 Views
33 Pages

28 July 2025

The digital business environment is rapidly evolving with advancements in information technology (IT), increasing the risk of information security incidents. Grounded in the resource-based view and in contingency theory, this study adopts a different...

of 799