This work is licensed under the Creative Commons Attribution 4.0 International License.
Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Computers & Security, 66, 40-51.Search in Google Scholar
Zhang, J. (2021). Distributed network security framework of energy internet based on internet of things. Sustainable Energy Technologies and Assessments, 44, 101051.Search in Google Scholar
Tourani, R., Misra, S., Mick, T., & Panwar, G. (2017). Security, privacy, and access control in information-centric networking: A survey. IEEE communications surveys & tutorials, 20(1), 566-600.Search in Google Scholar
Nieles, M., Dempsey, K., & Pillitteri, V. Y. (2017). An introduction to information security. NIST special publication, 800(12), 101.Search in Google Scholar
Lavrov, E. A., Zolkin, A. L., Aygumov, T. G., Chistyakov, M. S., & Akhmetov, I. V. (2021, February). Analysis of information security issues in corporate computer networks. In IOP Conference Series: Materials Science and Engineering (Vol. 1047, No. 1, p. 012117). IOP Publishing.Search in Google Scholar
Whitman, M. E., & Mattord, H. J. (2019). Management of information security. Cengage Learning.Search in Google Scholar
Gill, A. K., Zavarsky, P., & Swar, B. (2021, May). Automation of security and privacy controls for efficient information security management. In 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) (pp. 371-375). IEEE.Search in Google Scholar
Kumar, S., Kumar, M., Budhiraja, R., Das, M. K., & Singh, S. (2018). A cryptographic model for better information security. Journal of information security and applications, 43, 123-138.Search in Google Scholar
Kharytonov, E., Kharytonova, O., Tolmachevska, Y., Fasii, B., & Tkalych, M. (2019). Information security and means of its legal support. amazonia Investiga, 8(19), 255-265.Search in Google Scholar
Abraham, A., Dutta, P., Mandal, J. K., Bhattacharya, A., & Dutta, S. (2018). Emerging technologies in data mining and information security. Proceedings of IEMIS-2018.Search in Google Scholar
Bondarenko, S., Makeieva, O., Usachenko, O., Veklych, V., Arifkhodzhaieva, T., & Lernyk, S. (2022). The legal mechanisms for information security in the context of digitalization. Journal of Information Technology Management, 14(Special Issue: Digitalization of Socio-Economic Processes), 25-58.Search in Google Scholar
AlGhamdi, S., Win, K. T., & Vlahu-Gjorgievska, E. (2020). Information security governance challenges and critical success factors: Systematic review. Computers & security, 99, 102030.Search in Google Scholar
Korniyenko, B., Galata, L., & Ladieva, L. (2019, December). Research of information protection system of corporate network based on GNS3. In 2019 IEEE international conference on advanced trends in information theory (ATIT) (pp. 244-248). IEEE.Search in Google Scholar
Sun, Z., Strang, K. D., & Pambel, F. (2020). Privacy and security in the big data paradigm. Journal of computer information systems.Search in Google Scholar
Tao, J. L., & Chen, S. Y. (2017). Research on personal privacy protection in medical big data. In Proceedings of the 2nd International Conference on Artificial Intelligence and Engineering Applications (pp. 23-24).Search in Google Scholar
Abouelmehdi, K., Beni-Hessane, A., & Khaloufi, H. (2018). Big healthcare data: preserving security and privacy. Journal of big data, 5(1), 1-18.Search in Google Scholar
Hina, S., & Dominic, P. D. D. (2020). Information security policies’ compliance: a perspective for higher education institutions. Journal of Computer Information Systems.Search in Google Scholar
Menard, P., Bott, G. J., & Crossler, R. E. (2017). User motivations in protecting information security: Protection motivation theory versus self-determination theory. Journal of Management Information Systems, 34(4), 1203-1230.Search in Google Scholar
Mallaboyev, N. M., Sharifjanovna, Q. M., Muxammadjon, Q., & Shukurullo, C. (2022, May). Information security issues. In Conference Zone (pp. 241-245).Search in Google Scholar
Alkhudhayr, F., Alfarraj, S., Aljameeli, B., & Elkhdiri, S. (2019, May). Information security: A review of information security issues and techniques. In 2019 2nd international conference on computer applications & information security (ICCAIS) (pp. 1-6). IEEE.Search in Google Scholar
Sun, P. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications, 160, 102642.Search in Google Scholar
Dinesh Babu Mariappan,K.M. Baalamurugan & R. Saminathan. (2024). Secure Patient Data Monitoring and Efficient Routing Optimization using a Hyperelliptic Curve Cryptography with Fuzzy-based Priority in WBSN. Recent Advances in Electrical & Electronic Engineering(7),677-686.Search in Google Scholar
Hu Rong & Huang Ping. (2024). Enhanced Secure Storage of Big Data at Rest with Improved ECC and Paillier Homomorphic Encryption Algorithms. Tehnički vjesnik(2),510-517.Search in Google Scholar
Yuanyuan Ren,Wenlong Yang,Zhengzheng Tan,Liuyang Zhang & Rui Pan. (2024). A high-sensitivity balloon-type optical fiber sensor enables wide-range strain sensing with the assistance of CNN. Measurement115254-115254.Search in Google Scholar
Sanad Aburass,Osama Dorgham & Jamil Al Shaqsi. (2024). A hybrid machine learning model for classifying gene mutations in cancer using LSTM, BiLSTM, CNN, GRU, and GloVe. Systems and Soft Computing200110-200110.Search in Google Scholar
Chao Jiang,Xinyi Sun,Yingying Dai,Yujin Zhang,Duo Chen,Yingjie Li & Yingying Tang. (2024). EEG Emotion Recognition Employing RGPCN-BiGRUAM: ReliefF-Based Graph Pooling Convolutional Network and BiGRU Attention Mechanism. Electronics(13),2530-2530.Search in Google Scholar
Juan Dong,Liwen Xing,Ningbo Cui,Lu Zhao,Li Guo,Zhihui Wang... & Daozhi Gong. (2024). Estimating reference crop evapotranspiration using improved convolutional bidirectional long short-term memory network by multi-head attention mechanism in the four climatic zones of China. Agricultural Water Management108665-.Search in Google Scholar