Ying He
Cited by
Cited by
Human behaviour as an aspect of cybersecurity assurance
M Evans, LA Maglaras, Y He, H Janicke
Security and Communication Networks 9 (17), 4667-4679, 2016
Social internet of vehicles for smart cities
LA Maglaras, AH Al-Bayatti, Y He, I Wagner, H Janicke
Journal of Sensor and Actuator Networks 5 (1), 3, 2016
Smart cities and cyber security: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership
M Vitunskaite, Y He, T Brandstetter, H Janicke
Computers & Security 83, 313-331, 2019
Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review
Y He, A Aliyu, M Evans, C Luo
Journal of medical Internet research 23 (4), e21747, 2021
HEART-IS: A novel technique for evaluating human error-related information security incidents
M Evans, Y He, L Maglaras, H Janicke
Computers & Security 80, 74-89, 2019
On the security risks of the blockchain
E Zamani, Y He, M Phillips
Journal of Computer Information Systems 60 (6), 495-506, 2020
Internet of cloud: Security and privacy issues
A Cook, M Robinson, MA Ferrag, LA Maglaras, Y He, K Jones, H Janicke
Cloud Computing for Optimization: Foundations, Applications, and Challenges …, 2018
A holistic cybersecurity maturity assessment framework for higher education institutions in the United Kingdom
A Aliyu, L Maglaras, Y He, I Yevseyeva, E Boiten, A Cook, H Janicke
Applied Sciences 10 (10), 3660, 2020
On recommendation of learning objects using felder-silverman learning style model
SM Nafea, F Siewe, Y He
IEEE Access 7, 163034-163048, 2019
Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector
M Evans, Y He, L Maglaras, I Yevseyeva, H Janicke
International journal of medical informatics 127, 109-119, 2019
Game‐based learning: A review of tabletop exercises for cybersecurity incident response training
GN Angafor, I Yevseyeva, Y He
Security and privacy 3 (6), e126, 2020
A novel algorithm for course learning object recommendation based on student learning styles
SM Nafea, F Siewe, Y He
2019 International Conference on Innovative Trends in Computer Engineering …, 2019
Challenges of information security incident learning: an industrial case study in a Chinese healthcare organization
Y He, C Johnson
Informatics for Health and Social Care 42 (4), 393-408, 2017
Generic security cases for information system security in healthcare systems
Y He, CW Johnson
7th IET International Conference on System Safety, incorporating the Cyber …, 2012
Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form
M Evans, Y He, C Luo, I Yevseyeva, H Janicke, LA Maglaras
IEEE Access 7, 102087-102101, 2019
Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template
Y He, C Johnson
International journal of medical informatics 84 (11), 941-949, 2015
Bridging the cyber security skills gap: Using tabletop exercises to solve the CSSG crisis
GN Angafor, I Yevseyeva, Y He
Joint International Conference on Serious Games, 117-131, 2020
A security architectural pattern for risk management of industry control systems within critical national infrastructure
A Wood, Y He, LA Maglaras, H Janicke
International Journal of Critical Infrastructures 13 (2-3), 113-132, 2017
User interface design for privacy awareness in eHealth technologies
I Wagner, Y He, D Rosenberg, H Janicke
2016 13th IEEE annual consumer communications & networking conference (CCNC …, 2016
A fuzzy-logic approach to dynamic bayesian severity level classification of driver distraction using image recognition
A Fasanmade, Y He, AH Al-Bayatti, JN Morden, SO Aliyu, AS Alfakeeh, ...
IEEE Access 8, 95197-95207, 2020
The system can't perform the operation now. Try again later.
Articles 1–20