Human behaviour as an aspect of cybersecurity assurance M Evans, LA Maglaras, Y He, H Janicke Security and Communication Networks 9 (17), 4667-4679, 2016 | 224 | 2016 |
Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review Y He, A Aliyu, M Evans, C Luo Journal of medical Internet research 23 (4), e21747, 2021 | 176 | 2021 |
Smart cities and cyber security: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership M Vitunskaite, Y He, T Brandstetter, H Janicke Computers & Security 83, 313-331, 2019 | 174 | 2019 |
Social internet of vehicles for smart cities LA Maglaras, AH Al-Bayatti, Y He, I Wagner, H Janicke Journal of Sensor and Actuator Networks 5 (1), 3, 2016 | 167 | 2016 |
HEART-IS: A novel technique for evaluating human error-related information security incidents M Evans, Y He, L Maglaras, H Janicke Computers & Security 80, 74-89, 2019 | 117 | 2019 |
On the security risks of the blockchain E Zamani, Y He, M Phillips Journal of Computer Information Systems 60 (6), 495-506, 2020 | 108 | 2020 |
Internet of cloud: Security and privacy issues A Cook, M Robinson, MA Ferrag, LA Maglaras, Y He, K Jones, H Janicke Cloud Computing for Optimization: Foundations, Applications, and Challenges …, 2018 | 95 | 2018 |
A holistic cybersecurity maturity assessment framework for higher education institutions in the United Kingdom A Aliyu, L Maglaras, Y He, I Yevseyeva, E Boiten, A Cook, H Janicke Applied Sciences 10 (10), 3660, 2020 | 79 | 2020 |
On recommendation of learning objects using felder-silverman learning style model SM Nafea, F Siewe, Y He IEEE Access 7, 163034-163048, 2019 | 71 | 2019 |
Game‐based learning: A review of tabletop exercises for cybersecurity incident response training GN Angafor, I Yevseyeva, Y He Security and privacy 3 (6), e126, 2020 | 61 | 2020 |
Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector M Evans, Y He, L Maglaras, I Yevseyeva, H Janicke International journal of medical informatics 127, 109-119, 2019 | 51 | 2019 |
Challenges of information security incident learning: an industrial case study in a Chinese healthcare organization Y He, C Johnson Informatics for Health and Social Care 42 (4), 393-408, 2017 | 37 | 2017 |
A novel algorithm for course learning object recommendation based on student learning styles SM Nafea, F Siewe, Y He 2019 International Conference on Innovative Trends in Computer Engineering …, 2019 | 36 | 2019 |
Generic security cases for information system security in healthcare systems Y He, CW Johnson 7th IET International Conference on System Safety, incorporating the Cyber …, 2012 | 35 | 2012 |
Bridging the cyber security skills gap: Using tabletop exercises to solve the CSSG crisis GN Angafor, I Yevseyeva, Y He Joint International Conference on Serious Games, 117-131, 2020 | 32 | 2020 |
Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template Y He, C Johnson International journal of medical informatics 84 (11), 941-949, 2015 | 32 | 2015 |
Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form M Evans, Y He, C Luo, I Yevseyeva, H Janicke, LA Maglaras IEEE Access 7, 102087-102101, 2019 | 31 | 2019 |
Agile incident response (AIR): Improving the incident response process in healthcare Y He, ED Zamani, S Lloyd, C Luo International Journal of Information Management 62, 102435, 2022 | 30 | 2022 |
A security architectural pattern for risk management of industry control systems within critical national infrastructure A Wood, Y He, LA Maglaras, H Janicke International Journal of Critical Infrastructures 13 (2-3), 113-132, 2017 | 26 | 2017 |
User interface design for privacy awareness in eHealth technologies I Wagner, Y He, D Rosenberg, H Janicke 2016 13th IEEE annual consumer communications & networking conference (CCNC …, 2016 | 25 | 2016 |