[1]
|
A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection
IEEE Access,
2024
DOI:10.1109/ACCESS.2023.3348552
|
|
|
[2]
|
Handbook of Quality System, Accreditation and Conformity Assessment
2024
DOI:10.1007/978-981-99-4637-2_20-1
|
|
|
[3]
|
Model-Based Cybersecurity Analysis
Business & Information Systems Engineering,
2023
DOI:10.1007/s12599-023-00811-0
|
|
|
[4]
|
The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain
Information & Computer Security,
2023
DOI:10.1108/ICS-06-2022-0108
|
|
|
[5]
|
Information security and privacy in hospitals: a literature mapping and review of research gaps
Informatics for Health and Social Care,
2023
DOI:10.1080/17538157.2022.2049274
|
|
|
[6]
|
Digital-for-Development: Enabling Transformation, Inclusion and Sustainability Through ICTs
Communications in Computer and Information Science,
2023
DOI:10.1007/978-3-031-28472-4_14
|
|
|
[7]
|
HCI International 2023 Posters
Communications in Computer and Information Science,
2023
DOI:10.1007/978-3-031-36001-5_28
|
|
|
[8]
|
Anti-Crisis Approach to the Provision of the Environmental Sustainability of Economy
Approaches to Global Sustainability, Markets, and Governance,
2023
DOI:10.1007/978-981-99-2198-0_22
|
|
|
[9]
|
Information security objectives and the output legitimacy of ISO/IEC 27001: stakeholders’ perspective on expectations in private organizations in Sweden
Information Systems and e-Business Management,
2023
DOI:10.1007/s10257-023-00646-y
|
|
|
[10]
|
Modernizing Enterprise IT Audit Governance and Management Practices
Advances in IT Standards and Standardization Research,
2023
DOI:10.4018/978-1-6684-8766-2.ch007
|
|
|
[11]
|
The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain
Information & Computer Security,
2023
DOI:10.1108/ICS-06-2022-0108
|
|
|
[12]
|
Model-Based Cybersecurity Analysis
Business & Information Systems Engineering,
2023
DOI:10.1007/s12599-023-00811-0
|
|
|
[13]
|
Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives
Sensors,
2023
DOI:10.3390/s23198107
|
|
|
[14]
|
The Holistic Approach to Cybersecurity in Academia
Proceedings of the Central and Eastern European eDem and eGov Days,
2022
DOI:10.1145/3551504.3551516
|
|
|
[15]
|
An Online Gap Analysis on Cyber Security Principles for Thailand Organizations Based on ISO/IEC 27001:2013 Standard
2022 6th International Conference on Information Technology (InCIT),
2022
DOI:10.1109/InCIT56086.2022.10067572
|
|
|
[16]
|
Trustworthiness Models to Categorize and Prioritize Code for Security Improvement
SSRN Electronic Journal ,
2022
DOI:10.2139/ssrn.4117460
|
|
|
[17]
|
The Holistic Approach to Cybersecurity in Academia
Proceedings of the Central and Eastern European eDem and eGov Days,
2022
DOI:10.1145/3551504.3551516
|
|
|
[18]
|
Trustworthiness Models to Categorize and Prioritize Code for Security Improvement
SSRN Electronic Journal ,
2022
DOI:10.2139/ssrn.4191447
|
|
|
[19]
|
Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry
Sustainability,
2022
DOI:10.3390/su14031269
|
|
|
[20]
|
Information security and privacy in hospitals: a literature mapping and review of research gaps
Informatics for Health and Social Care,
2022
DOI:10.1080/17538157.2022.2049274
|
|
|
[21]
|
BYOD security issues: a systematic literature review
Information Security Journal: A Global Perspective,
2022
DOI:10.1080/19393555.2021.1923873
|
|
|
[22]
|
Initial Development of a Roadmap for Digital Engineering Simulations Curriculum
2022 IEEE International Systems Conference (SysCon),
2022
DOI:10.1109/SysCon53536.2022.9773836
|
|
|
[23]
|
Research Anthology on Combating Cyber-Aggression and Online Negativity
2022
DOI:10.4018/978-1-6684-5594-4.ch028
|
|
|
[24]
|
A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations
IEEE Access,
2022
DOI:10.1109/ACCESS.2022.3197899
|
|
|
[25]
|
Cybersecurity in Morocco
SpringerBriefs in Cybersecurity,
2022
DOI:10.1007/978-3-031-18475-8_2
|
|
|
[26]
|
Pervasive Computing and Social Networking
Lecture Notes in Networks and Systems,
2022
DOI:10.1007/978-981-16-5640-8_54
|
|
|
[27]
|
Exploring the Adoption of the International Information Security Management System Standard ISO/IEC 27001: A Web Mining-Based Analysis
IEEE Transactions on Engineering Management,
2021
DOI:10.1109/TEM.2020.2977815
|
|
|
[28]
|
Cybersecurity management in cloud computing: semantic literature review and conceptual framework proposal
Journal of Reliable Intelligent Environments,
2021
DOI:10.1007/s40860-020-00115-0
|
|
|
[29]
|
(CSM2-RA-R2-TI): Cyber Security Maturity Model for Risk Assessment Using Risk Register for Threat Intelligence
Journal of Physics: Conference Series,
2021
DOI:10.1088/1742-6596/2040/1/012005
|
|
|
[30]
|
Automated Enterprise Architecture Model Mining
2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC),
2021
DOI:10.1109/ISCSIC54682.2021.00044
|
|
|
[31]
|
System of Systems Lifecycle Management—A New Concept Based on Process Engineering Methodologies
Applied Sciences,
2021
DOI:10.3390/app11083386
|
|
|
[32]
|
Control Design of Information Security Related to Privacy in The Smart SIM Business Process
2021 3rd East Indonesia Conference on Computer and Information Technology (EIConCIT),
2021
DOI:10.1109/EIConCIT50028.2021.9431861
|
|
|
[33]
|
Information Security Management in ICT and Non-ICT Sector Companies: A Preventive Innovation Perspective
Computers & Security,
2021
DOI:10.1016/j.cose.2021.102383
|
|
|
[34]
|
Proposal for an Implementation Guide for a Computer Security Incident Response Team on a University Campus
Computers,
2021
DOI:10.3390/computers10080102
|
|
|
[35]
|
Distributed Ledger for Cybersecurity: Issues and Challenges in Railways
Sustainability,
2021
DOI:10.3390/su131810176
|
|
|
[36]
|
A Decision Support System for Optimal Selection of Enterprise Information Security Preventative Actions
IEEE Transactions on Network and Service Management,
2021
DOI:10.1109/TNSM.2020.3044865
|
|
|
[37]
|
Combating the Exploitation of Children in Cyberspace
2021
DOI:10.4018/978-1-7998-2360-5.ch003
|
|
|
[38]
|
Maturity of information systems security in selected private Banks in Ethiopia
2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA),
2021
DOI:10.1109/ICT4DA53266.2021.9672221
|
|
|
[39]
|
Bilinear Pairing-Based Hybrid Signcryption for Secure Heterogeneous Vehicular Communications
IEEE Transactions on Vehicular Technology,
2021
DOI:10.1109/TVT.2021.3078806
|
|
|
[40]
|
Assessment of Malaysian E-Passport PKI based on ISO 27000 Series International Standards
Journal of Physics: Conference Series,
2020
DOI:10.1088/1742-6596/1551/1/012003
|
|
|
[41]
|
Shaping the Future Through Standardization
Advances in Standardization Research,
2020
DOI:10.4018/978-1-7998-2181-6.ch008
|
|
|
[42]
|
Information security management frameworks and strategies in higher education institutions: a systematic review
Annals of Telecommunications,
2020
DOI:10.1007/s12243-020-00783-2
|
|
|
[43]
|
Big Picture on Privacy Enhancing Technologies in e-Health: A Holistic Personal Privacy Workflow
Information,
2020
DOI:10.3390/info11070356
|
|
|
[44]
|
Security Requirements Engineering Framework with BPMN 2.0.2 Extension Model for Development of Information Systems
Applied Sciences,
2020
DOI:10.3390/app10144981
|
|
|
[45]
|
Implementing Security and Trust in IoT/M2M using Middleware
2020 International Conference on Information Networking (ICOIN),
2020
DOI:10.1109/ICOIN48656.2020.9016435
|
|
|
[46]
|
LA CONTINUIDAD DE NEGOCIO EN LAS INSTITUCIONES DE EDUCACIÓN SUPERIOR DEL ECUADOR. CASO DE ESTUDIO.
REVISTA CIENTÍFICA MULTIDISCIPLINARIA ARBITRADA "YACHASUN",
2020
DOI:10.46296/yc.v4i7.0036
|
|
|
[47]
|
Benutzerzentrierte Unternehmensarchitekturen
2020
DOI:10.1007/978-3-658-30537-6_9
|
|
|
[48]
|
Framework for assessing responsiveness to personal data breaches
based on Capture-the-Flag
Journal of Multimedia Information System,
2020
DOI:10.33851/JMIS.2020.7.3.215
|
|
|
[49]
|
Ciberseguridad para la operación centralizada y distribuida de generación de energía eléctrica en ISAGEN
Ingeniería y Ciencia,
2020
DOI:10.17230/ingciencia.16.32.8
|
|
|
[50]
|
Vulnerable Code Detection Using Software Metrics and Machine Learning
IEEE Access,
2020
DOI:10.1109/ACCESS.2020.3041181
|
|
|
[51]
|
The Use of ISO/IEC 27005: 2018 for Strengthening Information Security Management (A Case Study at Data and Information Center of Ministry of Defence)
2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE),
2020
DOI:10.1109/ICITEE49829.2020.9271748
|
|
|
[52]
|
Comparing Blockchain Standards and Recommendations
Future Internet,
2020
DOI:10.3390/fi12120222
|
|
|
[53]
|
Security in Telehealth Systems From a Software Engineering Viewpoint: A Systematic Mapping Study
IEEE Access,
2020
DOI:10.1109/ACCESS.2020.2964988
|
|
|
[54]
|
Risk management practices in information security: Exploring the status quo in the DACH region
Computers & Security,
2020
DOI:10.1016/j.cose.2020.101776
|
|
|
[55]
|
Smart City Development in Taiwan: From the Perspective of the Information Security Policy
Sustainability,
2020
DOI:10.3390/su12072916
|
|
|
[56]
|
Isolation Design Flow Effectiveness Evaluation Methodology for Zynq SoCs
Electronics,
2020
DOI:10.3390/electronics9050814
|
|
|
[57]
|
A Study on Organizational IT Security in Mobile Software Ecosystems Literature
2020 IEEE International Conference on Software Architecture Companion (ICSA-C),
2020
DOI:10.1109/ICSA-C50368.2020.00047
|
|
|
[58]
|
A High-Level Comparison between the NIST Cyber Security Framework and the ISO 27001 Information Security Standard
2020 National Conference on Emerging Trends on Sustainable Technology and Engineering Applications (NCETSTEA),
2020
DOI:10.1109/NCETSTEA48365.2020.9119914
|
|
|
[59]
|
Information Security Management Frameworks in Higher Education Institutions: An Overview
2019 3rd Cyber Security in Networking Conference (CSNet),
2019
DOI:10.1109/CSNet47905.2019.9108845
|
|
|
[60]
|
Assessing cybersecurity maturity of organizations: An empirical investigation in the Indian context
Information Security Journal: A Global Perspective,
2019
DOI:10.1080/19393555.2019.1689318
|
|
|
[61]
|
A Conceptual Model for a Metric Based Framework for the Monitoring of Information Security Tasks’ Efficiency
Procedia Computer Science,
2019
DOI:10.1016/j.procs.2019.09.459
|
|
|
[62]
|
Cloud Computing - Technology and Practices
2019
DOI:10.5772/intechopen.76338
|
|
|
[63]
|
Comparative Study of Ontologies Based ISO 27000 Series Security Standards
Procedia Computer Science,
2019
DOI:10.1016/j.procs.2019.09.447
|
|
|
[64]
|
Cyberspace Safety and Security
Lecture Notes in Computer Science,
2019
DOI:10.1007/978-3-030-37352-8_53
|
|
|
[65]
|
(Implementing and Alignment the Information and Communication Technology (ICT) Strategic Planning, with the Organization's Strategic Planning in Government Sector) (Preparation, Implementation, Challenges and Proposed Solutions)
SSRN Electronic Journal ,
2019
DOI:10.2139/ssrn.3372601
|
|
|
[66]
|
A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems
Systems,
2019
DOI:10.3390/systems7020021
|
|
|
[67]
|
A new comprehensive solution to handle information security Governance in organizations
Proceedings of the 2nd International Conference on Networking, Information Systems & Security - NISS19,
2019
DOI:10.1145/3320326.3320382
|
|
|
[68]
|
Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework
2019 IEEE International Conference on Industrial Technology (ICIT),
2019
DOI:10.1109/ICIT.2019.8754937
|
|
|
[69]
|
Industrial Control Systems Security and Resiliency
Advances in Information Security,
2019
DOI:10.1007/978-3-030-18214-4_8
|
|
|
[70]
|
SGSI project at CNAF
EPJ Web of Conferences,
2019
DOI:10.1051/epjconf/201921408017
|
|
|
[71]
|
VLSI Design and Test
Communications in Computer and Information Science,
2019
DOI:10.1007/978-3-030-11407-7_9
|
|
|
[72]
|
Implementation of security system on humanitarian organization: case study of dompet dhuafa foundation
Journal of Physics: Conference Series,
2019
DOI:10.1088/1742-6596/1367/1/012004
|
|
|
[73]
|
HASTANELERDE BİLGİ GÜVENLİĞİ YÖNETİMİ: NİTEL BİR ARAŞTIRMA
Süleyman Demirel Üniversitesi Vizyoner Dergisi,
2019
DOI:10.21076/vizyoner.444451
|
|
|
[74]
|
An Approach for Trustworthiness Benchmarking Using Software Metrics
2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC),
2018
DOI:10.1109/PRDC.2018.00019
|
|
|
[75]
|
ISMSs In outsourcing Context
2018 21st Saudi Computer Society National Computer Conference (NCC),
2018
DOI:10.1109/NCG.2018.8593122
|
|
|
[76]
|
Monitoring Industry 4.0 applications for security and safety standard compliance
2018 IEEE Industrial Cyber-Physical Systems (ICPS),
2018
DOI:10.1109/ICPHYS.2018.8390801
|
|
|
[77]
|
INTERACTIONS AND COMPARISON OF IT RISK ANALYSIS METHODS
2018 4th International Conference on Cloud Computing Technologies and Applications (Cloudtech),
2018
DOI:10.1109/CloudTech.2018.8713346
|
|
|
[78]
|
Research Progress of Security Protection for Dispatching Automation System
2018 IEEE International Conference on Progress in Informatics and Computing (PIC),
2018
DOI:10.1109/PIC.2018.8706298
|
|
|
[79]
|
Reframing Security in Contemporary Software Development Life Cycle
2018 IEEE International Conference on Technology Management, Operations and Decisions (ICTMOD),
2018
DOI:10.1109/ITMC.2018.8691277
|
|
|
[80]
|
ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005
2018 International Conference on eDemocracy & eGovernment (ICEDEG),
2018
DOI:10.1109/ICEDEG.2018.8372361
|
|
|
[81]
|
Security Evaluation Framework for Military IoT Devices
Security and Communication Networks,
2018
DOI:10.1155/2018/6135845
|
|
|
[82]
|
Computer Safety, Reliability, and Security
Lecture Notes in Computer Science,
2017
DOI:10.1007/978-3-319-66284-8_17
|
|
|
[83]
|
Big Data
2016
DOI:10.4018/978-1-4666-9840-6.ch013
|
|
|
[84]
|
Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems
Future Internet,
2016
DOI:10.3390/fi8030036
|
|
|
[85]
|
The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets †
Future Internet,
2016
DOI:10.3390/fi8030030
|
|
|
[86]
|
Implementation of information security and data processing center protection standards
2016 IEEE Conference on Quality Management, Transport and Information Security, Information Technologies (IT&MQ&IS),
2016
DOI:10.1109/ITMQIS.2016.7751923
|
|
|
[87]
|
An expert system for risk assessment of information system security based on ISO 27002
2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA),
2016
DOI:10.1109/ICKEA.2016.7802992
|
|
|
[88]
|
The cloud computing standard ISO/IEC 27018 through the lens of the EU legislation on data protection
Computer Law & Security Review,
2016
DOI:10.1016/j.clsr.2015.12.005
|
|
|
[89]
|
Security im Produkt-Lifecycle – Lästige Pflicht oder Chance?
Informatik-Spektrum,
2016
DOI:10.1007/s00287-015-0938-1
|
|
|
[90]
|
ISMS Core Processes: A Study
Procedia Computer Science,
2016
DOI:10.1016/j.procs.2016.09.167
|
|
|
[91]
|
Encyclopedia of Information Science and Technology, Third Edition
2015
DOI:10.4018/978-1-4666-5888-2.ch421
|
|
|
[92]
|
Factors Affecting Individual Information Security Practices
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research - SIGMIS-CPR '15,
2015
DOI:10.1145/2751957.2751966
|
|
|
[93]
|
Information Architecture for Quality Management Support in Hospitals
Journal of Medical Systems,
2015
DOI:10.1007/s10916-015-0326-z
|
|
|
[94]
|
Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence
Advances in Data Mining and Database Management,
2015
DOI:10.4018/978-1-4666-8505-5.ch003
|
|
|
[95]
|
An information security control assessment methodology for organizations' financial information
International Journal of Accounting Information Systems,
2015
DOI:10.1016/j.accinf.2015.06.001
|
|
|
[96]
|
New Contributions in Information Systems and Technologies
Advances in Intelligent Systems and Computing,
2015
DOI:10.1007/978-3-319-16486-1_29
|
|
|
[97]
|
A model for the design of next generation e-supply chain digital forensic readiness tools
2015 Information Security for South Africa (ISSA),
2015
DOI:10.1109/ISSA.2015.7335075
|
|
|
[98]
|
Encyclopedia of Information Science and Technology, Third Edition
Advances in Information Quality and Management,
2014
DOI:10.4018/978-1-4666-5888-2.ch421
|
|
|
[99]
|
Comparison of File Integrity Monitoring (FIM) techniques for small business networks
Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT),
2014
DOI:10.1109/ICCCNT.2014.6963090
|
|
|
[100]
|
A Methodology to Develop the Integration of the Environmental Management System with Other Standardized Management Systems
Computational Water, Energy, and Environmental Engineering,
2014
DOI:10.4236/cweee.2014.34018
|
|
|
[101]
|
A Layered Trust Information Security Architecture
Sensors,
2014
DOI:10.3390/s141222754
|
|
|
[102]
|
The New Cloud Computing ISO/IEC 27018 Standard Through the Lens of the EU Legislation on Data Protection
SSRN Electronic Journal,
2014
DOI:10.2139/ssrn.2542125
|
|
|