Human factor security: evaluating the cybersecurity capacity of the industrial workforce
(2019)
Journal Article
Ani, U. D., He, H., & Tiwari, A. (2019). Human factor security: evaluating the cybersecurity capacity of the industrial workforce. Journal of Systems and Information Technology, 21(1), 2-35. https://doi.org/10.1108/jsit-02-2018-0028
Uchenna Ani's Outputs (33)
Definition of Internet of Things (IoT) Cyber Risk – Discussion on a Transformation Roadmap for Standardisation of Regulations, Risk Maturity, Strategy Design and Impact Assessment (2019)
Journal Article
Radanliev, P., De Roure, D., R.C. Nurse, J., Burnap, P., Anthi, E., Ani, U., …Mantilla Montalvo, R. Definition of Internet of Things (IoT) Cyber Risk – Discussion on a Transformation Roadmap for Standardisation of Regulations, Risk Maturity, Strategy Design and Impact Assessment. Preprints, https://doi.org/10.20944/preprints201903.0080.v1
A framework for Operational Security Metrics Development for industrial control environment (2018)
Journal Article
Ani, U. P. D., He, H. (., & Tiwari, A. (2018). A framework for Operational Security Metrics Development for industrial control environment. Journal of Cyber Security Technology, 2(3-4), 201-237. https://doi.org/10.1080/23742917.2018.1554986
Securing industrial control system environments: the missing piece (2018)
Journal Article
Ani, U. D., Daniel, N., Oladipo, F., & Adewumi, S. E. (2018). Securing industrial control system environments: the missing piece. Journal of Cyber Security Technology, 2(3-4), 131-163. https://doi.org/10.1080/23742917.2018.1554985
Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective (2016)
Journal Article
Ani, U. P. D., He, H. (., & Tiwari, A. (2017). Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective. Journal of Cyber Security Technology, 1(1), 32-74. https://doi.org/10.1080/23742917.2016.1252211
Human Capability Evaluation Approach for Cyber Security in Critical Industrial Infrastructure (2016)
Book Chapter
Daniel Ani, U. P., He, H. M., & Tiwari, A. (2016). Human Capability Evaluation Approach for Cyber Security in Critical Industrial Infrastructure. . Springer International Publishing. https://doi.org/10.1007/978-3-319-41932-9_14
BYOD NETWORK: Enhancing Security through Trust–Aided Access Control Mechanisms (2015)
Journal Article
Nwebonyi, F. N., The Society of Digital Information and Wireless Communication, & ANI, U. (2015). BYOD NETWORK: Enhancing Security through Trust–Aided Access Control Mechanisms. International Journal of Cyber-Security and Digital Forensics, 4(1), 272-289. https://doi.org/10.17781/p001410
A Comparative Assessment of Computer Security Incidence Handling (2014)
Journal Article
Ani, U., & Agbanusi, N. A Comparative Assessment of Computer Security Incidence Handling. British Journal of Mathematics and Computer Science, 4(22), 3120-3134. https://doi.org/10.9734/bjmcs/2014/11874
Safeguarding Forensic Integrity of Virtual Environment Evidence (2013)
Journal Article
Ani, U., & Epiphaniou, G. Safeguarding Forensic Integrity of Virtual Environment Evidence. International Journal of Computer Applications, 82(6), 43-52. https://doi.org/10.5120/14123-2240
Optimising VoIP Traffic over MANET: Leveraging the Power of TORA On-Demand Routing Protocol (2013)
Journal Article
Ani, U., Muhammad, M., & C. Agbanusi, N. Optimising VoIP Traffic over MANET: Leveraging the Power of TORA On-Demand Routing Protocol. International Journal of Computer Applications, 82(12), 38-52. https://doi.org/10.5120/14172-2414
Cyber Risk Management for the Internet of Things
Journal Article
Radanliev, P., Charles De Roure, D., R.C. Nurse, J., Burnap, P., Anthi, E., Uchenna, A., …Mantilla Montalvo, R. Cyber Risk Management for the Internet of Things. Preprints, https://doi.org/10.20944/preprints201904.0133.v1
Cyber Risk in IoT Systems
Journal Article
Radanliev, P., De Roure, D. C., Maple, C., Nurse, J. R., Nicolescu, R., & Ani, U. Cyber Risk in IoT Systems. Preprints, https://doi.org/10.20944/preprints201903.0104.v1
Socio-Technical Security Modelling: Analysis of State-of-the-Art, Application, and Maturity in Critical Industrial Infrastructure Environments/Domains
Journal Article
D Ani, U., M Watson, J., Tuptuk, N., Hailes, S., & Jawar, A. (2023). Socio-Technical Security Modelling: Analysis of State-of-the-Art, Application, and Maturity in Critical Industrial Infrastructure Environments/Domains. arXiv,This study explores the state-of-the-art, application, and maturity of socio-technical security models for industries and sectors dependent on CI and investigates the gap between academic research and industry practices concerning the modelling of bo... Read More about Socio-Technical Security Modelling: Analysis of State-of-the-Art, Application, and Maturity in Critical Industrial Infrastructure Environments/Domains.