-
101
-
102
Securing Blockchain-Based Supply Chain Workflow against Internal and External Attacks
Published 2022-05-01“…Therefore, the goal of this work was to develop a methodology that enhances the protection of BSW against various internal (e.g., Stuxnet) and external (e.g., local data breach of a stakeholder) cyber threats through monitoring the stakeholder business process. …”
Get full text
Article -
103
Implementasi BGP dan Resource Public Key Infrastructure menggunakan BIRD untuk Keamanan Routing
Published 2021-12-01“…This attack aims to disrupt connections between AS and divert routing to destinations that are not appropriate for crimes, such as fraud and data breach. One of the methods developed to prevent prefix hijacking is the Resource Public Key Infrastructure (RPKI). …”
Get full text
Article -
104
Negotiating Privacy and Mobile Socializing: Chinese University Students’ Concerns and Strategies for Using Geosocial Networking Applications
Published 2020-03-01“…Privacy risks have significant increase with the widespread use of geosocial networking applications (GSNAs). The Facebook data breach case in 2018 triggered many users’ concerns and focused attention on the debate about the trustworthiness of GSNAs globally. …”
Get full text
Article -
105
Fingerprinting of Relational Databases for Stopping the Data Theft
Published 2020-07-01“…Some recipients of this data can also become traitors by leaking the important data. As a result, the data breaches due to data leakage are also increasing. …”
Get full text
Article -
106
Security breaches and modifications on cybersecurity disclosures
Published 2022-09-01“…Data: We extracted cybersecurity breach incidents from the Data Breach Database, a centralized and global database of data breaches maintained by a leading security company. …”
Get full text
Article -
107
Cyberterrorism as a global threat: a review on repercussions and countermeasures
Published 2024-01-01“…The past ten years have seen several cyber-attacks around the globe including WannaCry attack (2017), Yahoo data breaches (2013–2014), OPM data breach (2015), SolarWinds supply chain attack (2020) etc. …”
Get full text
Article -
108
An Analytical Review of Industrial Privacy Frameworks and Regulations for Organisational Data Sharing
Published 2023-11-01“…A key component of this study is the analysis of the Facebook–Cambridge Analytica data breach, which illustrates the significant privacy violations and their wider implications. …”
Get full text
Article -
109
A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT)
Published 2021-07-01“…Despite providing several benefits, the heterogeneous nature and the extensive connectivity of the devices make it a target of different cyberattacks that result in data breach and financial loss. There is a severe need to secure the IoT environment from such attacks. …”
Get full text
Article -
110
BiVA : Bitcoin network visualization & analysis
Published 2019“…Its functionalities are demonstrated with a case study of extortion of Ashley Madison data breach victims.…”
Get full text
Get full text
Conference Paper -
111
Trusted cloud computing framework in critical industrial application
Published 2015“…This raises the risks of insider and outsider threats besides the data breach and misuse. A Trusted Cloud Computing Framework (TCCF) is designed to overcome these SPT concerns. …”
Get full text
Thesis -
112
Economic perspective analysis of protecting big data security and privacy
Published 2019“…That is, do we need to protect big data in a secure, private, and most effective manner, while the growing amount of security threats, attacks, and data breaches together with the increasing market for security products arises? …”
Get full text
Article -
113
An empirical investigation into the information management systems at a South African financial institution
Published 2016-10-01“…Such organizations may have policies and procedures, strategies and systems in place in order to mitigate the risk of information breaches, but data breaches are still on the rise. The objectives of this study are to explore the shortfalls of information security on a South African financial institution and further investigate whether business processes are responsive to organization’s needs. …”
Get full text
Article -
114
An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks
Published 2019-07-01“…Nevertheless, this integration comes with security risks such as data breach that might be caused by credential-stealing malware. …”
Get full text
Article -
115
A Deep Learning Model for Information Loss Prevention From Multi-Page Digital Documents
Published 2021-01-01“…Along with the revolution arose the need for data security and consumer privacy protection, primarily concerning financial institutions. The data breach of Equifax in 2017 and personal information leaks from Facebook in 2021 led to general skepticism among the customers of large corporations. …”
Get full text
Article -
116
Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability
Published 2024-02-01“…However, according to Verizon’s “2022 Data Breach Investigations Report”, among all security incidents, security incidents caused by password exposures accounted for 82%. …”
Get full text
Article -
117
A Higher-Level Security Scheme for Key Access on Cloud Computing
Published 2021-01-01“…Since the key does not need to be held anywhere, the problem of a data breach based on key disclosure risk is also eliminated.…”
Get full text
Article -
118
Improved Detection and Response via Optimized Alerts: Usability Study
Published 2022-05-01“…Organizations thus risk data breach, loss of valuable human resources, reputational damage, and impact to revenue when excessive security alert volume and a lack of fidelity degrade detection services. …”
Get full text
Article -
119
A Review of Blockchain’s Role in E-Commerce Transactions: Open Challenges, and Future Research Directions
Published 2024-01-01“…Owing to the sensitivity of customer data, employee records, and customer records, organizations must ensure their protection. A data breach not only affects an enterprise’s financial performance but also erodes clients’ confidence in the platform. …”
Get full text
Article -
120
Privacy-preserving user profile matching in social networks
Published 2020“…Most recently, an online dating website, Ashley Madison, was hacked, which results in disclosure of a large number of dating user profiles. This data breach has urged researchers to explore practical privacy protection for user profiles in a social network. …”
Get full text
Journal Article