• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Gunduz MZ, Das R. Smart Grid Security: An Effective Hybrid CNN-Based Approach for Detecting Energy Theft Using Consumption Patterns. Sensors (Basel) 2024;24:1148. [PMID: 38400308 PMCID: PMC10893418 DOI: 10.3390/s24041148] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/05/2024] [Revised: 01/30/2024] [Accepted: 02/02/2024] [Indexed: 02/25/2024]
2
Ji IH, Lee JH, Kang MJ, Park WJ, Jeon SH, Seo JT. Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review. Sensors (Basel) 2024;24:898. [PMID: 38339615 PMCID: PMC10857182 DOI: 10.3390/s24030898] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/31/2023] [Revised: 12/31/2023] [Accepted: 01/26/2024] [Indexed: 02/12/2024]
3
Žvanut B, Mihelič A. Qualitative study on domestic social robot adoption and associated security concerns among older adults in Slovenia. Front Psychol 2024;15:1343077. [PMID: 38333061 PMCID: PMC10850379 DOI: 10.3389/fpsyg.2024.1343077] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/22/2023] [Accepted: 01/12/2024] [Indexed: 02/10/2024]  Open
4
Sheik AT, Maple C, Epiphaniou G, Dianati M. Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment. Sensors (Basel) 2023;24:241. [PMID: 38203103 DOI: 10.3390/s24010241] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/23/2023] [Revised: 12/04/2023] [Accepted: 12/14/2023] [Indexed: 01/12/2024]
5
Guidetti OA, Speelman CP, Bouhlas P. The WACDT, a modern vigilance task for network defense. Front Neurogenom 2023;4:1215497. [PMID: 38234483 PMCID: PMC10790921 DOI: 10.3389/fnrgo.2023.1215497] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/02/2023] [Accepted: 10/23/2023] [Indexed: 01/19/2024]
6
Gzyl H, ter Horst E, Peña-Garcia N, Torres A. Understanding the Feature Space and Decision Boundaries of Commercial WAFs Using Maximum Entropy in the Mean. Entropy (Basel) 2023;25:1476. [PMID: 37998168 PMCID: PMC10670514 DOI: 10.3390/e25111476] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/10/2023] [Revised: 09/24/2023] [Accepted: 09/26/2023] [Indexed: 11/25/2023]
7
Dart M, Ahmed M. Evaluating Staff Attitudes, Intentions, and Behaviors Related to Cyber Security in Large Australian Health Care Environments: Mixed Methods Study. JMIR Hum Factors 2023;10:e48220. [PMID: 37792450 PMCID: PMC10585427 DOI: 10.2196/48220] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/16/2023] [Revised: 06/20/2023] [Accepted: 07/24/2023] [Indexed: 10/05/2023]  Open
8
Mahalingam A, Perumal G, Subburayalu G, Albathan M, Altameem A, Almakki RS, Hussain A, Abbas Q. ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks. Sensors (Basel) 2023;23:8044. [PMID: 37836874 PMCID: PMC10575244 DOI: 10.3390/s23198044] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/04/2023] [Revised: 09/17/2023] [Accepted: 09/22/2023] [Indexed: 10/15/2023]
9
Aslam MM, Tufail A, Kim KH, Apong RAAHM, Raza MT. A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospects. Sensors (Basel) 2023;23:7999. [PMID: 37766053 PMCID: PMC10536937 DOI: 10.3390/s23187999] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/16/2023] [Revised: 09/14/2023] [Accepted: 09/18/2023] [Indexed: 09/29/2023]
10
Lilhore UK, Manoharan P, Simaiya S, Alroobaea R, Alsafyani M, Baqasah AM, Dalal S, Sharma A, Raahemifar K. HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning. Sensors (Basel) 2023;23:7856. [PMID: 37765912 PMCID: PMC10535139 DOI: 10.3390/s23187856] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/06/2023] [Revised: 04/13/2023] [Accepted: 04/25/2023] [Indexed: 09/29/2023]
11
Nobili M. Review OSINT tool for social engineering. Front Big Data 2023;6:1169636. [PMID: 37719683 PMCID: PMC10504660 DOI: 10.3389/fdata.2023.1169636] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/19/2023] [Accepted: 07/31/2023] [Indexed: 09/19/2023]  Open
12
Sobb T, Turnbull B, Moustafa N. A Holistic Review of Cyber-Physical-Social Systems: New Directions and Opportunities. Sensors (Basel) 2023;23:7391. [PMID: 37687846 PMCID: PMC10490255 DOI: 10.3390/s23177391] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/30/2023] [Revised: 08/15/2023] [Accepted: 08/22/2023] [Indexed: 09/10/2023]
13
Jang W, Kim H, Seo H, Kim M, Yoon M. SELID: Selective Event Labeling for Intrusion Detection Datasets. Sensors (Basel) 2023;23:6105. [PMID: 37447954 DOI: 10.3390/s23136105] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/07/2023] [Revised: 06/26/2023] [Accepted: 06/29/2023] [Indexed: 07/15/2023]
14
Sheikh ZA, Singh Y, Singh PK, Gonçalves PJS. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS). Sensors (Basel) 2023;23:5459. [PMID: 37420626 DOI: 10.3390/s23125459] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/09/2023] [Revised: 05/26/2023] [Accepted: 06/06/2023] [Indexed: 07/09/2023]
15
Kutschera S, Slany W, Ratschiller P, Gursch S, Dagenborg H. MRNG: Accessing Cosmic Radiation as an Entropy Source for a Non-Deterministic Random Number Generator. Entropy (Basel) 2023;25:854. [PMID: 37372198 DOI: 10.3390/e25060854] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/28/2023] [Revised: 05/17/2023] [Accepted: 05/23/2023] [Indexed: 06/29/2023]
16
Reeves A, Ashenden D. Understanding decision making in security operations centres: building the case for cyber deception technology. Front Psychol 2023;14:1165705. [PMID: 37292498 PMCID: PMC10245128 DOI: 10.3389/fpsyg.2023.1165705] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/14/2023] [Accepted: 05/09/2023] [Indexed: 06/10/2023]  Open
17
Darwish SM, Farhan DA, Elzoghabi AA. Building an Effective Classifier for Phishing Web Pages Detection: A Quantum-Inspired Biomimetic Paradigm Suitable for Big Data Analytics of Cyber Attacks. Biomimetics (Basel) 2023;8:biomimetics8020197. [PMID: 37218783 DOI: 10.3390/biomimetics8020197] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/11/2023] [Revised: 05/01/2023] [Accepted: 05/05/2023] [Indexed: 05/24/2023]  Open
18
Fatani A, Dahou A, Abd Elaziz M, Al-Qaness MAA, Lu S, Alfadhli SA, Alresheedi SS. Enhancing Intrusion Detection Systems for IoT and Cloud Environments Using a Growth Optimizer Algorithm and Conventional Neural Networks. Sensors (Basel) 2023;23:s23094430. [PMID: 37177634 PMCID: PMC10181590 DOI: 10.3390/s23094430] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/12/2023] [Revised: 04/07/2023] [Accepted: 04/18/2023] [Indexed: 05/15/2023]
19
Kotak J, Habler E, Brodt O, Shabtai A, Elovici Y. Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions. Sensors (Basel) 2023;23:4018. [PMID: 37112359 PMCID: PMC10142274 DOI: 10.3390/s23084018] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/13/2023] [Revised: 04/09/2023] [Accepted: 04/13/2023] [Indexed: 06/19/2023]
20
Bilal M, Khan A, Jan S, Musa S, Ali S. Roman Urdu Hate Speech Detection Using Transformer-Based Model for Cyber Security Applications. Sensors (Basel) 2023;23:3909. [PMID: 37112249 PMCID: PMC10143294 DOI: 10.3390/s23083909] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/26/2022] [Revised: 01/17/2023] [Accepted: 01/19/2023] [Indexed: 06/19/2023]
21
Khan J, Lim DW, Kim YS. Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks. Sensors (Basel) 2023;23:3554. [PMID: 37050613 PMCID: PMC10098590 DOI: 10.3390/s23073554] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/27/2023] [Revised: 03/15/2023] [Accepted: 03/23/2023] [Indexed: 06/19/2023]
22
Sivamohan S, Sridhar SS. An optimized model for network intrusion detection systems in industry 4.0 using XAI based Bi-LSTM framework. Neural Comput Appl 2023;35:11459-11475. [PMID: 37155462 PMCID: PMC9999327 DOI: 10.1007/s00521-023-08319-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/23/2022] [Accepted: 01/16/2023] [Indexed: 03/12/2023]
23
Naghshvarianjahromi M, Kumar S, Deen MJ. Natural Intelligence as the Brain of Intelligent Systems. Sensors (Basel) 2023;23:2859. [PMID: 36905061 PMCID: PMC10007130 DOI: 10.3390/s23052859] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/20/2023] [Revised: 02/22/2023] [Accepted: 03/01/2023] [Indexed: 06/18/2023]
24
Alabdulatif A, Thilakarathne NN, Lawal ZK, Fahim KE, Zakari RY. Internet of Nano-Things (IoNT): A Comprehensive Review from Architecture to Security and Privacy Challenges. Sensors (Basel) 2023;23:2807. [PMID: 36905010 PMCID: PMC10007150 DOI: 10.3390/s23052807] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/29/2023] [Revised: 02/07/2023] [Accepted: 02/20/2023] [Indexed: 06/18/2023]
25
Ibrahim M, Elhafiz R. Security Analysis of Cyber-Physical Systems Using Reinforcement Learning. Sensors (Basel) 2023;23:1634. [PMID: 36772676 PMCID: PMC9920547 DOI: 10.3390/s23031634] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/15/2022] [Revised: 01/22/2023] [Accepted: 01/30/2023] [Indexed: 06/18/2023]
26
Akhtar MS, Feng T. Evaluation of Machine Learning Algorithms for Malware Detection. Sensors (Basel) 2023;23:946. [PMID: 36679741 PMCID: PMC9862094 DOI: 10.3390/s23020946] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/26/2022] [Revised: 01/03/2023] [Accepted: 01/06/2023] [Indexed: 06/17/2023]
27
Balla A, Habaebi MH, Elsheikh EAA, Islam MR, Suliman FM. The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems. Sensors (Basel) 2023;23:s23020758. [PMID: 36679553 PMCID: PMC9865947 DOI: 10.3390/s23020758] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/27/2022] [Revised: 12/23/2022] [Accepted: 01/03/2023] [Indexed: 05/14/2023]
28
Khan IU, Aslam N, AlShedayed R, AlFrayan D, AlEssa R, AlShuail NA, Al Safwan A. A Proactive Attack Detection for Heating, Ventilation, and Air Conditioning (HVAC) System Using Explainable Extreme Gradient Boosting Model (XGBoost). Sensors (Basel) 2022;22:9235. [PMID: 36501938 PMCID: PMC9740645 DOI: 10.3390/s22239235] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/17/2022] [Revised: 11/07/2022] [Accepted: 11/07/2022] [Indexed: 06/17/2023]
29
Ren R, Su J, Yang B, Lau RYK, Liu Q. Novel Low-Power Construction of Chaotic S-Box in Multilayer Perceptron. Entropy (Basel) 2022;24:1552. [PMID: 36359642 PMCID: PMC9688956 DOI: 10.3390/e24111552] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/30/2022] [Revised: 10/24/2022] [Accepted: 10/26/2022] [Indexed: 06/16/2023]
30
Liu X, Ahmad SF, Anser MK, Ke J, Irshad M, Ul-Haq J, Abbas S. Cyber security threats: A never-ending challenge for e-commerce. Front Psychol 2022;13:927398. [PMID: 36337532 PMCID: PMC9629147 DOI: 10.3389/fpsyg.2022.927398] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/27/2022] [Accepted: 07/20/2022] [Indexed: 08/01/2023]  Open
31
Rathore RS, Hewage C, Kaiwartya O, Lloret J. In-Vehicle Communication Cyber Security: Challenges and Solutions. Sensors (Basel) 2022;22:s22176679. [PMID: 36081138 PMCID: PMC9460802 DOI: 10.3390/s22176679] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/18/2022] [Revised: 08/28/2022] [Accepted: 08/31/2022] [Indexed: 06/01/2023]
32
Awad M, Fraihat S, Salameh K, Al Redhaei A. Examining the Suitability of NetFlow Features in Detecting IoT Network Intrusions. Sensors (Basel) 2022;22:6164. [PMID: 36015924 PMCID: PMC9412997 DOI: 10.3390/s22166164] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/29/2022] [Revised: 08/08/2022] [Accepted: 08/16/2022] [Indexed: 06/15/2023]
33
Ullah F, Ullah S, Naeem MR, Mostarda L, Rho S, Cheng X. Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation. Sensors (Basel) 2022;22:5883. [PMID: 35957440 PMCID: PMC9371416 DOI: 10.3390/s22155883] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/14/2022] [Revised: 07/20/2022] [Accepted: 08/04/2022] [Indexed: 06/15/2023]
34
Nerini M, Favarelli E, Chiani M. Augmented PIN Authentication through Behavioral Biometrics. Sensors (Basel) 2022;22:4857. [PMID: 35808354 PMCID: PMC9269565 DOI: 10.3390/s22134857] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/28/2022] [Revised: 06/24/2022] [Accepted: 06/24/2022] [Indexed: 06/15/2023]
35
Kumar R, Subbiah G. Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach. Sensors (Basel) 2022;22:2798. [PMID: 35408413 PMCID: PMC9002855 DOI: 10.3390/s22072798] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/15/2022] [Revised: 03/28/2022] [Accepted: 03/28/2022] [Indexed: 06/14/2023]
36
Kim YJ, Park CH, Yoon M. FILM: Filtering and Machine Learning for Malware Detection in Edge Computing. Sensors (Basel) 2022;22:2150. [PMID: 35336322 DOI: 10.3390/s22062150] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/04/2022] [Revised: 03/07/2022] [Accepted: 03/08/2022] [Indexed: 01/27/2023]
37
Liu G, Su X, Hong F, Zhong X, Liang Z, Wu X, Huang Z. A Novel Epidemic Model Base on Pulse Charging in Wireless Rechargeable Sensor Networks. Entropy (Basel) 2022;24:302. [PMID: 35205596 DOI: 10.3390/e24020302] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/07/2022] [Revised: 02/14/2022] [Accepted: 02/14/2022] [Indexed: 02/05/2023]
38
Kotenko I, Izrailov K, Buinevich M. Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches. Sensors (Basel) 2022;22:s22041335. [PMID: 35214237 PMCID: PMC8963110 DOI: 10.3390/s22041335] [Citation(s) in RCA: 6] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/19/2021] [Revised: 01/29/2022] [Accepted: 02/05/2022] [Indexed: 02/01/2023]
39
Monoscalco L, Simeoni R, Maccioni G, Giansanti D. Information Security in Medical Robotics: A Survey on the Level of Training, Awareness and Use of the Physiotherapist. Healthcare (Basel) 2022;10:159. [PMID: 35052322 PMCID: PMC8775601 DOI: 10.3390/healthcare10010159] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/03/2021] [Revised: 01/03/2022] [Accepted: 01/06/2022] [Indexed: 01/27/2023]  Open
40
Rocha-Jácome C, Carvajal RG, Chavero FM, Guevara-Cabezas E, Hidalgo Fort E. Industry 4.0: A Proposal of Paradigm Organization Schemes from a Systematic Literature Review. Sensors (Basel) 2021;22:66. [PMID: 35009609 PMCID: PMC8747394 DOI: 10.3390/s22010066] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/03/2021] [Revised: 12/18/2021] [Accepted: 12/21/2021] [Indexed: 06/14/2023]
41
Giansanti D, Gulino RA. The Cybersecurity and the Care Robots: A Viewpoint on the Open Problems and the Perspectives. Healthcare (Basel) 2021;9:healthcare9121653. [PMID: 34946379 PMCID: PMC8702125 DOI: 10.3390/healthcare9121653] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/05/2021] [Revised: 11/23/2021] [Accepted: 11/24/2021] [Indexed: 11/16/2022]  Open
42
Vida Z, Vissi B, Palicz T, Lám J. Smart & Safe – digitization strategy from a patient safety perspective. Orv Hetil 2021;162:1876-1884. [PMID: 34801981 DOI: 10.1556/650.2021.32289] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/21/2021] [Accepted: 05/16/2021] [Indexed: 11/19/2022]
43
Xie Y, Guo Y, Yang S, Zhou J, Chen X. Security-Related Hardware Cost Optimization for CAN FD-Based Automotive Cyber-Physical Systems. Sensors (Basel) 2021;21:s21206807. [PMID: 34696020 PMCID: PMC8537982 DOI: 10.3390/s21206807] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/02/2021] [Revised: 10/06/2021] [Accepted: 10/11/2021] [Indexed: 11/16/2022]
44
Mohammed GDF, Chandran P, Mansoor Z, Mohaddis M. Locked the Car, Why Not the Computer: A Qualitative and Quantitative Study on Data Safety Compliance. Cureus 2021;13:e17513. [PMID: 34595080 PMCID: PMC8473945 DOI: 10.7759/cureus.17513] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 08/27/2021] [Indexed: 11/07/2022]  Open
45
Kim K, Shin Y, Lee J, Lee K. Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator. Sensors (Basel) 2021;21:6522. [PMID: 34640841 DOI: 10.3390/s21196522] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/01/2021] [Revised: 09/23/2021] [Accepted: 09/27/2021] [Indexed: 11/17/2022]
46
Henn F, Zowalla R, Mayer A. The Security State of the German Health Web: An Exploratory Study. Stud Health Technol Inform 2021;283:180-185. [PMID: 34545834 DOI: 10.3233/shti210558] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
47
Dodson CTJ, Soldera J, Scharcanski J. Some Information Geometric Aspects of Cyber Security by Face Recognition. Entropy (Basel) 2021;23:e23070878. [PMID: 34356419 PMCID: PMC8307538 DOI: 10.3390/e23070878] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/04/2021] [Revised: 06/28/2021] [Accepted: 06/29/2021] [Indexed: 12/05/2022]
48
Moustafa AA, Bello A, Maurushat A. The Role of User Behaviour in Improving Cyber Security Management. Front Psychol 2021;12:561011. [PMID: 34220596 PMCID: PMC8253569 DOI: 10.3389/fpsyg.2021.561011] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/11/2020] [Accepted: 05/03/2021] [Indexed: 11/13/2022]  Open
49
Grobler M, Gaire R, Nepal S. User, Usage and Usability: Redefining Human Centric Cyber Security. Front Big Data 2021;4:583723. [PMID: 33748750 PMCID: PMC7968726 DOI: 10.3389/fdata.2021.583723] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/15/2020] [Accepted: 01/20/2021] [Indexed: 11/13/2022]  Open
50
Min M, Lee JJ, Park H, Lee K. Detecting Anomalous Transactions via an IoT Based Application: A Machine Learning Approach for Horse Racing Betting. Sensors (Basel) 2021;21:2039. [PMID: 33805841 DOI: 10.3390/s21062039] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/31/2021] [Revised: 03/02/2021] [Accepted: 03/08/2021] [Indexed: 11/24/2022]
PrevPage 1 of 2 12Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA