专题:Information and Cyber Security

This cluster of papers focuses on information security policy compliance, awareness, and behavioral intentions in organizations. It covers topics such as deterrence, attack graphs, risk management, insider threats, game theory, and cybersecurity. The papers explore the influence of rationality-based beliefs, fear appeals, and protection motivation on security behaviors, as well as the role of top management and organizational culture in improving compliance with information security policies.
最新文献
Facts About Fact-Checkers: Comparing Credibility Perceptions, Usage, and Sharing of Different Fact-Checking Sources

article Full Text OpenAlex

PentestAgent: Incorporating LLM Agents to Automated Penetration Testing

article Full Text OpenAlex

2025 International Carnahan Conference on Security Technology

article Full Text OpenAlex

Common Terminology Criteria for Adverse Events, version 5.0

book-chapter Full Text OpenAlex

A Study on the Importance of Features in Detecting Advanced Persistent Threats Using Machine Learning

book-chapter Full Text OpenAlex

Modeling the Case of Cyber Espionage for Executive Game Simulations

book-chapter Full Text OpenAlex

Expanding Perspectives in Emergency Management and Health Care IT Systems

article Full Text OpenAlex

The $1.4 Billion Bybit Hack: Cybersecurity Failures and the Risks of Cryptocurrency Deregulation

article Full Text OpenAlex

La ciberseguridad como prioridad empresarial dentro de marcos los regulatorios y normativos internacionales

article Full Text OpenAlex

Ransomware dynamics: Mitigating personal data exfiltration through the SCIRAS lens

article Full Text OpenAlex

近5年高被引文献
A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments

review Full Text OpenAlex 493 FWCI20.076

AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions

article Full Text OpenAlex 385 FWCI41.098

International Journal of Advanced Research in Computer and Communication Engineering

article Full Text OpenAlex 357 FWCI35.19

Introduction to Computer Security

other Full Text OpenAlex 328 FWCI0

A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges

article Full Text OpenAlex 325 FWCI45.34

Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey

article Full Text OpenAlex 305 FWCI35.68

Intrusion Detection Systems: A Survey and Taxonomy

preprint Full Text OpenAlex 239 FWCI0

A survey on attack detection, estimation and control of industrial cyber–physical systems

article Full Text OpenAlex 239 FWCI24.687

Cyber risk and cybersecurity: a systematic review of data availability

review Full Text OpenAlex 224 FWCI12.789

Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies

article Full Text OpenAlex 215 FWCI22.399