专题:Information and Cyber Security

This cluster of papers focuses on information security policy compliance, awareness, and behavioral intentions in organizations. It covers topics such as deterrence, attack graphs, risk management, insider threats, game theory, and cybersecurity. The papers explore the influence of rationality-based beliefs, fear appeals, and protection motivation on security behaviors, as well as the role of top management and organizational culture in improving compliance with information security policies.
最新文献
Annotated Critique: SITG Cryptographic Transformation and Modernisation Whitepaper V6

article Full Text OpenAlex

SCENARIO ORIENTED SUFFICIENCY CRITERIA FOR PHYSICAL PROTECTION SYSTEMS PROVIDE A TRACEABLE PATH FROM THREAT CLASSES TO DESIGN REQUIREMENTS

article Full Text OpenAlex

Attack the Messages, Not the Agents: A Multi-round Adaptive Stealthy Tampering Framework for LLM-MAS

article Full Text OpenAlex

Agentic AI for Autonomous Defense in Software Supply Chain Security: Beyond Provenance to Vulnerability Mitigation

article Full Text OpenAlex

Protection of DevOps Pipelines: Automation of Security within DevSecOps

article Full Text OpenAlex

Paradox of cybersecurity? The democratic deficit in municipal work to raise citizens' risk awareness

article Full Text OpenAlex

Zero Trust CI/CD Pipeline: A Blueprint for Secure Software Delivery in Modern DevSecOp

article Full Text OpenAlex

Security Analytics and Digital Forensics for Enterprise Risk Management, Advances and Practical Implications

article Full Text OpenAlex

What skills do cybersecurity professionals need?

article Full Text OpenAlex

Integrating Cyber Warfare Studies into CTE: Lessons from the NotPetya Attack for Cybersecurity Education

article Full Text OpenAlex

近5年高被引文献
International Journal of Advanced Research in Computer and Communication Engineering

article Full Text OpenAlex 556 FWCI0

A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges

article Full Text OpenAlex 528 FWCI58.848

Cyber risk and cybersecurity: a systematic review of data availability

review Full Text OpenAlex 316 FWCI90.8923

Introduction to Computer Security

other Full Text OpenAlex 310 FWCI0

Common Terminology Criteria for Adverse Events, version 5.0

book-chapter Full Text OpenAlex 266 FWCI0

Cyber security: State of the art, challenges and future directions

article Full Text OpenAlex 241 FWCI47.0237

Intrusion Detection Systems: A Survey and Taxonomy

preprint Full Text OpenAlex 234 FWCI0

The Role of Machine Learning in Cybersecurity

article Full Text OpenAlex 233 FWCI29.7969

Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review

article Full Text OpenAlex 215 FWCI65.0759

Advancing cybersecurity: a comprehensive review of AI-driven detection techniques

review Full Text OpenAlex 205 FWCI67.5796