专题:Information and Cyber Security

This cluster of papers focuses on information security policy compliance, awareness, and behavioral intentions in organizations. It covers topics such as deterrence, attack graphs, risk management, insider threats, game theory, and cybersecurity. The papers explore the influence of rationality-based beliefs, fear appeals, and protection motivation on security behaviors, as well as the role of top management and organizational culture in improving compliance with information security policies.
最新文献
Reconnaissance behavior in honeypot systems: An analysis of offender’s online mobility

article Full Text OpenAlex

Learning-to-Explain through 20Q Gaming: An Explainable Recommender for Cybersecurity Education

article Full Text OpenAlex

Integrating Cyber Warfare Studies into CTE: Lessons from the NotPetya Attack for Cybersecurity Education

article Full Text OpenAlex

Advocacy coalitions in cyber warfare: From global negotiations to issue-specific initiatives

article Full Text OpenAlex

Bridging AI and software security: A comparative vulnerability assessment of LLM agent deployment paradigms

article Full Text OpenAlex

Cybersecurity of weapon systems: international law requirements and technical standards

article Full Text OpenAlex

Reinforced Honeypot Technique Integrated with Game Theory and Reinforcement Learning (RL) To Enhance Cyber Defence Mechanisms

article Full Text OpenAlex

Proactive Insider Threat Detection Framework: An Explainable AI and Behavioral Analytics-Driven Approach

article Full Text OpenAlex

A Systematic Approach to Predict the Impact of Cybersecurity Vulnerabilities Using LLMs

article Full Text OpenAlex

Development of Cyber-Space Vulnerabilities Online Monitoring Solution Using Machine Learning

book-chapter Full Text OpenAlex

近5年高被引文献
International Journal of Advanced Research in Computer and Communication Engineering

article Full Text OpenAlex 556 FWCI0

A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges

article Full Text OpenAlex 509 FWCI58.1042

Introduction to Computer Security

other Full Text OpenAlex 309 FWCI0

Cyber risk and cybersecurity: a systematic review of data availability

review Full Text OpenAlex 303 FWCI90.6935

Common Terminology Criteria for Adverse Events, version 5.0

book-chapter Full Text OpenAlex 265 FWCI39.1671

Intrusion Detection Systems: A Survey and Taxonomy

preprint Full Text OpenAlex 233 FWCI0

Cyber security: State of the art, challenges and future directions

article Full Text OpenAlex 225 FWCI45.6409

The Role of Machine Learning in Cybersecurity

article Full Text OpenAlex 218 FWCI29.4658

Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review

article Full Text OpenAlex 210 FWCI64.9709

Advancing cybersecurity: a comprehensive review of AI-driven detection techniques

review Full Text OpenAlex 187 FWCI67.3063