The Evolution of Cyberattack Motives
How to cite (IJASEIT) :
S. Boonkrong, Authentication and Access Control: Practical
Cryptography Methods and Tools, Apress, 2021.
National Institute of Standards and Technology, "Security
Requirements for Cryptographic Modules," National Institute of Standards and Technology, Washington, D.C., 2001.
International Organization for Standardization, "ISO/IEC 27000:2018 Information technology - Security techniques - Information security management systems," International Organization for Standardization, Vernier, Geneva, Switzerland, 2018.
R. Mei, H. B. Yan and Z. H. Han, "RansomLens: Understanding Ransomware via Causality Analysis on System Provenance Graph," Lecture Notes in CompSci, SceSec2021, 13 - 5 Aug 2021.
L. Huang and Q. Zhu, "Duplicity Games for Deception Design with an Application to Insider Threat Mitigation," IEEE Trans. Inf. Forensics Secur., vol. 16, pp. 4843 - 4856, 2021.
R. Chen, D. J. Kim and R. H. Rao, "A study of social networking site use from a three-pronged security and privacy threat assessment perspective," Inf. Mang., vol. 58, no. 5, July 2021.
A.Altalbe and F. Kateb, "Assuring enhanced privacy violation detection model for social networks," Int. J. Intell. Comput., vol.15, no. 1, pp. 75 - 91, 2022.
M. Mahapatra, N. Gupta and R. Kushwaha, "Data Breach in Social Networks Using Machine Learning," Commun. Comput. Inf. Sci., IACC 2021, 18 - 19 December 2021.
Y. Li and Q. Liu, "A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments," Energy Rep., vol. 7, pp. 8176-8186, September 2021.
T. Oyinloye, T. Eze and L. Speakman, "Towards Cyber-User Awareness: Design and Evaluation," in Proc. of Eur. Conf. Inf. Warf. Secur., Reading, UK, 2020.
H. Hamam and D. Abdelouahid, "An OWASP top ten driven survey on web application protection methods," LNCS, pp. 235-252, 2021.
N. K. Singh, P. Gupta, V. Singh and R. Ranjan, "Attacks on Vulnerable Web Applications," CONIT 2021, 25 - 27 June 2021.
T. J. Holt and S. v. d. Weijer, "An Examination of Motivation and Routine Activity Theory to Account for Cyberattacks Against Dutch Web Sites," Crim Justice Behav, vol. 47, no. 4, pp. 487-505, January 2020.
J.W. Welburn and A.M. Strong, "Systemic Cyber Risk and Aggregate Impacts", Risk Anal., In Press, 2021.
R. Gandhi, A. Sharma, W. Mahoney, W. Sousan, Q. Zhu and P. Laplante, "Dimensions of cyber-attacks: Cultural, social, economic, and political," IEEE Technol. Soc. Mag., vol. 30, no. 1, pp. 28-38, Spring 2011.
S.K. Srivastava, S. Das, G.J. Udo and K. Bagchi, "Determinants of Cybercrime Originating within a Nation: A Cross-country Study,"
J. Glob. Inf. Technol., vol. 23, no. 2, pp. 112 - 137, April 2020.
M. Uma and G. Padmavathi, "A Survey on Various Cyber Attacks and their Classification," International Journal of Network Security, vol. 15, no. 5, pp. 390-396, 2013.
S.S. Bhuyan, U.Y. Kabir, J.M. Escareno, K. Ector, S. Palakodeti, D. Wyant, S. Kumar, M. Levy, S. Kedia, D. Dasgupta and A. Dobolian, "Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations," J. Med. Syst., vol. 44, no. 5, May 2020.
V.-L. Nguyen, P.-C. Lin and R.-H. Hwang, "Web attacks: defeating monetisation attempts," Netw. Secur., vol. 2019, no. 5, pp. 11-19, May 2019.
A. Jawad and J. Jaskolka, "Modeling and Simulation Approaches for Cybersecurity Impact Analysis: State-of-the-Art," in Proc of ANNSIM 2021, Virtual Fairfax, 19-22 July 2021.
M. Maasberg, X. Zhang, M. Ko, S. R. Miller and N. L. Beebe, "An Analysis of Motive and Observable Behavioral Indicators Associated With Insider Cyber-Sabotage and Other Attacks," IEEE Eng. Manag. Rev., vol. 48, no. 2, pp. 151-165, June 2020.
M. J. Pappaterra, F. Flammini, V. Vittorini and N. Besinovic, "A Systematic Review of Artificial Intelligence Public Datasets for Railway Applications," Infrastructures, vol. 6, no. 10, pp. 1-28, October 2021.
P. Silva, C. Macas, E. Polisciuc and P. Machado, "Visualisation Tool to Support Fraud Detection," in Proc. of IV, Sydney, 5-9 July 2021.
F. Fong, Z. Qin, L. Xue, J. Zhang, X. Lin and X. Shen, "Privacy-Preserving Keyword Similarity Search over Encrypted Spatial Data in Cloud Computing," IEEE Internet Things J., in Press, 2021.
J. Lu, "Data Analytics Research-Informed Teaching in a Digital Technologies Curriculum," ITE, vol. 20, no. 2, pp. 57-72, 2020.
Barclays, "IoD Policy Report - Cyber Security Underpinning the Digital Economy," Barclays, London, UK, 2016.
J. Franco, A. Aris, B. Canberk and A.S. Uluagac, "A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems," IEEE Commun. Surv. Tutor., vol. 23, no. 4, pp. 2351-2383, 2021.
R. Aggarwal and P. Ranganathan, "Common pitfalls in statistical analysis: The use of correlation techniques," Perspect Clin Res., vol. 7, no. 4, p. 187, October - December 2016.
N. Saxena, E. Hayes, E. Bertino, P. Ojo, K.-K. R. Choo and P. Burnap, "Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses," Elec., vol. 9, no. 9, pp. 1-29, 2020.
P. Chapman, "Defending against insider threats with network security's eighth layer," Comput. Fraud Secur., vol. 2021, no. 3, pp. 8 - 13, March 2021.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).