A typology of cybersecurity behavior among knowledge workers
- Creator: Baltuttis, Dennik , Teubner, Timm , Adam, Marc T. P.
- Resource Type: journal article
- Date: 2024
Sampling-Based Machine Learning Models for Intrusion Detection in Imbalanced Dataset
- Creator: Fan, Zongwen , Sohail, Shaleeza , Sabrina, Fariza , Gu, Xin
- Resource Type: journal article
- Date: 2024
A Novel Deep Learning-Based Approach for Malware Detection
- Creator: Shaukat, Kamran , Luo, Suhuai , Varadharajan, Vijay
- Resource Type: journal article
- Date: 2023
Emergent Insight of the Cyber Security Management for Saudi Arabian Universities: A Content Analysis
- Creator: Masmali, Hamzah Hadi , Miah, Shah J.
- Resource Type: conference paper
- Date: 2023
Pattern recognition and machine learning techniques for cyber security
- Creator: Shaukat, Kamran
- Resource Type: thesis
- Date: 2023
Rushing for security: a document analysis on the sources and effects of time pressure on organizational cybersecurity
- Creator: Chowdhury, Noman H. , Adam, Marc T. P. , Teubner, Timm
- Resource Type: journal article
- Date: 2023
A Novel Method for Improving the Robustness of Deep Learning-Based Malware Detectors Against Adversarial Attacks
- Creator: Shaukat, Kamran , Luo, Suhuai , Varadharajan, Vijay
- Resource Type: journal article
- Date: 2022
Multi-tiered Artificial Neural Networks model for intrusion detection in smart homes
- Creator: Sohail, Shaleeza , Fan, Zongwen , Gu, Xin , Sabrina, Fariza
- Resource Type: journal article
- Date: 2022
Rushed to crack–On the perceived effectiveness of cybersecurity measures for secure behaviour under time pressure
- Creator: Chowdhury, Noman H. , Adam, Marc T. P. , Teubner, Timm
- Resource Type: journal article
- Date: 2022
Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments
- Creator: Huertas Celdrán, Alberto , Karmakar, Kallol Krishna , Gómez Mármol, Félix , Varadharajan, Vijay
- Resource Type: journal article
- Date: 2021
New challenges in supply chain management: cybersecurity across the supply chain
- Creator: Melnyk, Seven A. , Schoenherr, Tobias , Speier-Pero, Cheri , Peters, Chris , Chang, Jeff F. , Friday, Derek
- Resource Type: journal article
- Date: 2021
A secure control mechanism for network environments
- Creator: Sadeghikhorami, Ladan , Zamani, Mohsen , Chen, Zhiyong , Safavi, Ali Akbar
- Resource Type: journal article
- Date: 2020
Cyber Threat Detection Using Machine Learning Techniques: A Performance Evaluation Perspective
- Creator: Shaukat, Kamran , Luo, Suhuai , Chen, Shan , Liu, Dongxi
- Resource Type: conference paper
- Date: 2020
Performance comparison and current challenges of using machine learning techniques in cybersecurity
- Creator: Shaukat, Kamran , Luo, Suhuai , Varadharajan, Vijay , Hameed, Ibrahim A. , Chen, Shan , Liu, Dongxi , Li, Jiaming
- Resource Type: journal article
- Date: 2020
Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures
- Creator: Chowdhury, Noman H. , Adam, Marc T. P. , Teubner, Timm
- Resource Type: journal article
- Date: 2020
The impact of time pressure on cybersecurity behaviour: a systematic literature review
- Creator: Chowdhury, Noman H. , Adam, Marc T. P. , Skinner, Geoffrey
- Resource Type: journal article
- Date: 2019
The impact of time pressure on human cybersecurity behavior: an integrative framework
- Creator: Chowdhury, Norman H. , Adam, Marc T. P. , Skinner, Geoffrey
- Resource Type: conference paper
- Date: 2018