Affiliation:
1. Charles Sturt University, Australia
Abstract
Research questions remain to be answered in terms of discovering how security could be provided for different resources, such as data, devices, and networks. Most organizations compromise their security measures due to high budgets despite its primary importance in today's highly dependent cyber world and as such there are always some loopholes in security systems, which cybercriminals take advantage of. In this chapter, the authors have completed an analysis of data obtained from 31 peer-reviewed scientific research studies (2009-2017) describing cybersecurity issues and solutions. The results demonstrated that the majority of applications in this area are from the government and the public sector (17%) whereas transportation and other areas have a minor percentage (6%). This study determined that the government sector is the main application area in cybersecurity and is more susceptible to cyber-attacks whereas the wireless sensor network and healthcare areas are less exposed to attack.
Reference44 articles.
1. Aledhari, M., Marhoon, A., Hamad, A., & Saeed, F. (2017). A New Cryptography Algorithm to Protect Cloud-Based Healthcare Services. Paper presented at the 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).
2. Aledhari, M., Marhoon, A., Hamad, A., & Saeed, F. (2017). A New Cryptography Algorithm to Protect Cloud-based Healthcare Services. IEEE.
3. Bowen, Z., Li, W., Deng, P., Gérardy, L., Zhu, Q., & Shankar, N. (2015). Design and verification for transportation system security. Paper presented at the 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
4. Cashion, J., & Bassiouni, M. (2011). Protocol for mitigating the risk of hijacking social networking sites. Paper presented at the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
5. Cashion, J., & Bassiouni, M. (2011). Protocol for Mitigating the Risk of Hijacking Social Networking Sites. IEEE.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. GPU-based Classification for Wireless Intrusion Detection;Proceedings of the 2021 on Systems and Network Telemetry and Analytics;2020-06-21
2. Feature Selection Improves Tree-based Classification for Wireless Intrusion Detection;Proceedings of the 3rd International Workshop on Systems and Network Telemetry and Analytics;2020-06-16