4.6 Article

An Evolutionary Game Theoretic Analysis of Cybersecurity Investment Strategies for Smart-Home Users against Cyberattacks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

A Survey of User Perspectives on Security and Privacy in a Home Networking Environment

Nandita Pattnaik et al.

Summary: The security and privacy of smart home systems from the perspective of home users have been extensively researched in recent years. However, a meta-review of 52 papers revealed a gap in literature reviews on user perspectives of smart home security and privacy since the 2010s, motivating a systematic literature review covering 126 relevant research papers published from 2010 to 2021. This review identified the need for further research on holistic methods, interactions between multiple home users and devices, diverse data flow, demographic factors, and advanced conceptual frameworks.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Hardware & Architecture

Measuring Security Practices

Louis F. DeKoven et al.

Summary: This study investigates the prevalence of security practices and other potentially security-relevant behaviors among 15,000 computers, and explores how differences in key security behaviors impact the likelihood of a device being compromised.

COMMUNICATIONS OF THE ACM (2022)

Review Computer Science, Information Systems

A survey on blockchain, SDN and NFV for the smart-home security

N'guessan Yves-Roland Douha et al.

Summary: Smart-home security has attracted the attention of industry professionals, attackers, and academic researchers. Recent studies have focused on the role of blockchain, SDN, and NFV in addressing security challenges, proposing new architectures. SDN and NFV enhance home network management and access control, while blockchain strengthens IoT data security and privacy.

INTERNET OF THINGS (2022)

Article Computer Science, Interdisciplinary Applications

Cybersecurity awareness training programs: a cost-benefit analysis framework

Zuopeng (Justin) Zhang et al.

Summary: Through a cost-benefit analysis, the study classifies different types of CSAT programs to help organizations develop effective cybersecurity awareness training. Findings show that CSAT programs with different costs play a differing role in maintaining, upgrading or lowering a company's existing security level. Ideally, CSAT programs should allocate more expenses towards training employees to deal with security threats at lower security levels and reducing more losses at higher security levels.

INDUSTRIAL MANAGEMENT & DATA SYSTEMS (2021)

Article Psychology, Multidisciplinary

How do Older Adults feel about engaging with Cyber-Security?

Benjamin Morrison et al.

Summary: Research shows that older adults recognize the importance of protective online behaviors, but reasons for disengagement mainly fall into three categories. Confidence in engaging with protective behaviors for older adults is closely related to personal competence, support, and demand.

HUMAN BEHAVIOR AND EMERGING TECHNOLOGIES (2021)

Article Education & Educational Research

Parents' knowledge and skills about the risks of the digital world

Lukasz Tomczyk et al.

Summary: This study investigated the level of digital literacy related to internet safety among parents of primary school students in Poland, revealing areas of neglect in knowledge regarding protecting children against unwanted communication and secure logging-in. However, more than one fifth of parents showed a satisfactory level of digital literacy related to online safety.

SOUTH AFRICAN JOURNAL OF EDUCATION (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Optimization of Cybersecurity Investment Strategies in the Smart Grid Using Game-Theory

Burhan Hyder et al.

2020 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT) (2020)

Article Chemistry, Multidisciplinary

On the n-Dimensional Phase Portraits

Martin-Antonio Rodriguez-Licea et al.

APPLIED SCIENCES-BASEL (2019)

Proceedings Paper Computer Science, Software Engineering

A New Model-based Framework for Testing Security of IoT Systems in Smart Cities using Attack Trees and Price Timed Automata

Moez Krichen et al.

PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING (ENASE) (2019)

Article Education & Educational Research

Survey results on adults and cybersecurity education

Joseph Ricci et al.

EDUCATION AND INFORMATION TECHNOLOGIES (2019)

Article Operations Research & Management Science

A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints

Anna Nagurney et al.

ANNALS OF OPERATIONS RESEARCH (2017)

Article Computer Science, Theory & Methods

Anonymous Secure Framework in Connected Smart Home Environments

Pardeep Kumar et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage

Ahmed A. Alabdel Abass et al.

IEEE ACCESS (2017)

Article Computer Science, Theory & Methods

Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online

Alessandro Acquisti et al.

ACM COMPUTING SURVEYS (2017)

Article Multidisciplinary Sciences

The replicator equation and other game dynamics

Ross Cressman et al.

PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA (2014)

Proceedings Paper Computer Science, Theory & Methods

The Psychology of Security for the Home Computer User

Adele E. Howe et al.

2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)

Article Computer Science, Information Systems

Cyber security for home users: A new way of protection through awareness enforcement

E. Kritzinger et al.

COMPUTERS & SECURITY (2010)

Review Information Science & Library Science

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach

John D'Arcy et al.

INFORMATION SYSTEMS RESEARCH (2009)

Article Computer Science, Information Systems

Security beliefs and barriers for novice Internet users

Steven Furnell et al.

COMPUTERS & SECURITY (2008)

Article Computer Science, Information Systems

Assessing the security perceptions of personal Internet users

S. M. Furnell et al.

COMPUTERS & SECURITY (2007)