|
|
|
Huda Lughbi, Mourad Mars and Khaled Almotairi
The pervasive reach of social media like the X platform, formerly known as Twitter, offers unique opportunities for real-time analysis of cyberattack developments. By parsing and classifying tweets related to cyberattacks, we can glean valuable insights ...
ver más
|
|
|
|
|
|
|
Agnieszka Dutkowska-Zuk, Joe Bourne, Chengyuan An, Xuan Gao, Oktay Cetinkaya, Peter Novitzky, Gideon Ogunniye, Rachel Cooper, David De Roure, Julie McCann, Jeremy Watson, Tim Watson and Eleri Jones
This systematic literature review explores the scholarly debate around public perceptions and behaviors in the context of cybersecurity in connected places. It reveals that, while many articles highlight the importance of public perceptions and behaviors...
ver más
|
|
|
|
|
|
|
Omar Flor-Unda, Freddy Simbaña, Xavier Larriva-Novo, Ángel Acuña, Rolando Tipán and Patricia Acosta-Vargas
Vulnerabilities in cyber defense in the countries of the Latin American region have favored the activities of cybercriminals from different parts of the world who have carried out a growing number of cyberattacks that affect public and private services a...
ver más
|
|
|
|
|
|
|
Shereen Ismail, Diana W. Dawoud and Hassan Reza
As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs) are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have several limitations which complicate the design of effective attack prevent...
ver más
|
|
|
|
|
|
|
Tehseen Mazhar, Hafiz Muhammad Irfan, Sunawar Khan, Inayatul Haq, Inam Ullah, Muhammad Iqbal and Habib Hamam
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the most challenging things to stop. The biggest problem is caused by milli...
ver más
|
|
|
|
|
|
|
Yuhang Zhang and Ming Ni
With the increasing deployment of advanced sensing and measurement devices, the modern distribution system is evolved into a cyber-physical power distribution system (CPPDS). Due to the extensive application of information and communication technology, C...
ver más
|
|
|
|
|
|
|
Moody Alhanaya and Khalil Al-Shqeerat
Internet of Things technology opens the horizon to a broader scope of intelligent applications in smart cities. However, the massive amount of traffic exchanged among devices may cause security risks, especially when devices are compromised or vulnerable...
ver más
|
|
|
|
|
|
|
N?guessan Yves-Roland Douha, Masahiro Sasabe, Yuzo Taenaka and Youki Kadobayashi
In the digital era, smart-home users face growing threats from cyberattacks that threaten their privacy and security. Hence, it is essential for smart-home users to prioritize cybersecurity education and training to secure their homes. Despite this, the ...
ver más
|
|
|
|
|
|
|
Mohamed ElKashlan, Heba Aslan, Mahmoud Said Elsayed, Anca D. Jurcut and Marianne A. Azer
The market for Electric Vehicles (EVs) has expanded tremendously as seen in the recent Conference of the Parties 27 (COP27) held at Sharm El Sheikh, Egypt in November 2022. This needs the creation of an ecosystem that is user-friendly and secure. Interne...
ver más
|
|
|
|
|
|
|
Raha Soleymanzadeh, Mustafa Aljasim, Muhammad Waseem Qadeer and Rasha Kashef
Smart devices are used in the era of the Internet of Things (IoT) to provide efficient and reliable access to services. IoT technology can recognize comprehensive information, reliably deliver information, and intelligently process that information. Mode...
ver más
|
|
|
|