Now showing items 1-10 of 12
Evaluating Information Security Core Human Error Causes (IS-CHEC) Technique in Public Sector and Comparison with the Private Sector
Background The number of reported public sector information security incidents has significantly increased recently including 22% related to the UK health sector. Over two thirds of these incidents pertain to human error, ...
Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form
(IEEE Access, 2019-07-05)
The objective of the research was to establish data relating to underlying causes of human error which are the most common cause of information security incidents within a private sector healthcare organisation. A survey ...
Intrusion Detection System for Platooning Connected Autonomous Vehicles
The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication ...
Blockchain and Random Subspace Learning-based IDS for SDN-enabled Industrial IoT Security
The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with these issues, novel technologies ...
DeliveryCoin: An IDS and Blockchain-based Delivery Framework for Drone-Delivered Services
In this paper, we propose an intrusion detection system (IDS) and Blockchain-based delivery framework, called DeliveryCoin, for drone-delivered services. The DeliveryCoin framework consists of four phases, including system ...
DeepCoin: A Novel Deep learning and Blockchain-based Energy Exchange Framework for Smart Grids
(IEEE Transactions on Engineering Management, 2019-07-09)
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues
This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for ...
Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed
Security of Critical National Infrastructures (CNI) is one of the major concerns tocountries both in a European and in a worldwide level. Training on scenarios thatinvolve such systems is important to the effective handling ...
Estimating the Relative Speed of RF Jammers in VANETs
Vehicular Ad-Hoc Networks (VANETs) aim at enhancing road safety and providing a comfortable driving environment by delivering early warning and infotainment messages to the drivers. Jamming attacks, however, pose a significant ...
Real-time information security incident management: a case study using the IS-CHEC technique
Information security recognised the human as the weakest link. Despite numerous international or sector-specific standards and frameworks, the information security community has not yet adopted formal mechanisms to manage ...