Skip to main content

Research Repository

Advanced Search

All Outputs (20)

CyberEntRel: Research Paper, Dataset and Code (2024)
Dataset
Hina, S. (2024). CyberEntRel: Research Paper, Dataset and Code. [Dataset]. https://doi.org/10.17866/rd.salford.28001966.v1

The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense strategies for security professionals. These are built from cyber threat intelligence data based on relation triples where each relation triple contains two e... Read More about CyberEntRel: Research Paper, Dataset and Code.

IoT Research and Innovation Lab - Smart Home System (IRIL-SHS) (2024)
Dataset
Hina, S. (2024). IoT Research and Innovation Lab - Smart Home System (IRIL-SHS). [Dataset]. https://doi.org/10.17866/rd.salford.28035425.v1

Smart cities, businesses, workplaces, and even residences have all been converged by the Internet of Things (IoT). The types and characteristics of these devices vary depending on the industry 4.0 and have rapidly increased recently, especially in sm... Read More about IoT Research and Innovation Lab - Smart Home System (IRIL-SHS).

An Investigation of Feature Reduction, Transferability, and Generalization in AWID Datasets for Secure Wi-Fi Networks (2024)
Journal Article
Khalid, N., Hina, S., Khurram, S., Zaidi, Gaber, T., Speakman, L., & Noor, Z. (in press). An Investigation of Feature Reduction, Transferability, and Generalization in AWID Datasets for Secure Wi-Fi Networks. PLoS ONE, https://doi.org/10.1371/journal.pone.0306747

The widespread use of wireless networks to transfer an enormous amount of sensitive information has caused a plethora of vulnerabilities and privacy issues. The management frames, particularly authentication and association frames, are vulnerable to... Read More about An Investigation of Feature Reduction, Transferability, and Generalization in AWID Datasets for Secure Wi-Fi Networks.

Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees (2023)
Journal Article
Faizan Ali, R., Dominic, P. D. D., Hina, S., & Naseer, S. (in press). Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees. International Journal of Information Security, https://doi.org/10.1007/s10207-023-00786-9

Oil and gas (O&G) organizations are progressively being digitalized in order to facilitate substantial information flow to remain competitive in the information age. This critical sector is spearheading the establishment of technical security measure... Read More about Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees.

CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning (2023)
Journal Article
Ahmed, K., Khurshid, S. K., & Hina, S. (2024). CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning. Computers and Security, 136, 103579. https://doi.org/10.1016/j.cose.2023.103579

The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense strategies for security professionals. These are built from cyber threat intelligence data based on relation triples where each relation triple contains two e... Read More about CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning.

Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems (2023)
Journal Article
Abbas, Q., Hina, S., Sajjad, H., Zaidi, K. S., & Akbar, R. (in press). Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems. PeerJ Computer Science, 9, e1552. https://doi.org/10.7717/peerj-cs.1552

Network intrusion is one of the main threats to organizational networks and systems. Its timely detection is a profound challenge for the security of networks and systems. The situation is even more challenging for small and medium enterprises (SMEs)... Read More about Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems.

An intelligent context-aware threat detection and response model for smart cyber-physical systems (2023)
Journal Article
Noor, Z., Hina, S., Hayat, F., & Shah, G. A. (2023). An intelligent context-aware threat detection and response model for smart cyber-physical systems. Internet of Things, 23, Article 100843. https://doi.org/10.1016/j.iot.2023.100843

Smart cities, businesses, workplaces, and even residences have all been converged by the Internet of Things (IoT). The types and characteristics of these devices vary depending on the industry 4.0 and have rapidly increased recently... Read More about An intelligent context-aware threat detection and response model for smart cyber-physical systems.

Agentless approach for security information and event management in industrial IoT (2023)
Journal Article
Zahid, H., Hina, S., Hayat, M., & Shah, G. (in press). Agentless approach for security information and event management in industrial IoT. Electronics, 12(8), 1831. https://doi.org/10.3390/electronics12081831

The Internet of Things (IoT) provides ease of real-time communication in homes, industries, health care, and many other dependable and interconnected sectors. However, in recent years, smart infrastructure, including cyber-physical industries, has wi... Read More about Agentless approach for security information and event management in industrial IoT.

Threat modeling in smart firefighting systems: aligning MITRE ATT&CK Matrix and NIST security controls (2023)
Journal Article
Zahid, S., Mazhar, M., Abbas, S., Hanif, Z., Hina, S., & Shah, G. (in press). Threat modeling in smart firefighting systems: aligning MITRE ATT&CK Matrix and NIST security controls. Internet of Things, 22, https://doi.org/10.1016/j.iot.2023.100766

Industrial automation technologies are envisioned as multi-device systems that are constantly interacting with one another and with enterprise systems. In these industrial systems, the industrial internet of things (IIoT) significantly improves syste... Read More about Threat modeling in smart firefighting systems: aligning MITRE ATT&CK Matrix and NIST security controls.

An automated context-aware IoT vulnerability assessment rule-set generator (2022)
Journal Article
Hashmat, F., Abbas, S., Hina, S., Shah, G., Bakhshi, T., & Abbas, W. (2022). An automated context-aware IoT vulnerability assessment rule-set generator. Computer Communications, 186, 133-152. https://doi.org/10.1016/j.comcom.2022.01.022

While introducing unprecedented applications, Internet of Things (IoT) has simultaneously provoked acute security challenges, in the form of the vulnerabilities. Mainly because manufacturers overlook the security considerations and produce devices th... Read More about An automated context-aware IoT vulnerability assessment rule-set generator.

Beyond the horizon, backhaul connectivity for offshore IoT devices (2021)
Journal Article
Shabih Zaidi, K., Hina, S., Jawad, M., Nawaz Khan, A., & Nawaz, R. (2021). Beyond the horizon, backhaul connectivity for offshore IoT devices. Energies, 14(21), https://doi.org/10.3390/en14216918

The prevalent use of the Internet of Things (IoT) devices over the Sea, such as, on oil and gas platforms, cargo, and cruise ships, requires high-speed connectivity of these devices. Although satellite based backhaul links provide vast coverage, but... Read More about Beyond the horizon, backhaul connectivity for offshore IoT devices.

Institutional governance and protection motivation: theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world (2019)
Journal Article
Hina, S., Dominic, P., & Lowry, P. (2019). Institutional governance and protection motivation: theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world. Computers and Security, 87, https://doi.org/10.1016/j.cose.2019.101594

Higher education institutions (HEIs) are progressively computerized to deal with substantial academic and operational information. With the increase in enriched information systems (IS) comes the potential hazard of malicious exposure to internal and... Read More about Institutional governance and protection motivation: theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world.

Information security policies’ compliance: a perspective for higher education institutions (2018)
Journal Article
Hina, S., & Dominic, P. (2018). Information security policies’ compliance: a perspective for higher education institutions. Journal of Computer Information Systems, 60(3), 201-211. https://doi.org/10.1080/08874417.2018.1432996

This paper provides a systematic literature review in the information security policies’ compliance (ISPC) field, with respect to information security culture, information security awareness, and information security management exploring in various s... Read More about Information security policies’ compliance: a perspective for higher education institutions.

Need for information security policies compliance: a perspective in Higher Education Institutions (2017)
Presentation / Conference
Hina, S., & Dominic, P. (2017, July). Need for information security policies compliance: a perspective in Higher Education Institutions. Presented at 2017 International Conference on Research and Innovation in Information Systems (ICRIIS), Langkawi, Malaysia

Organizations profoundly rely on contemporary information systems as they store essential business and resources data. Security of these information systems is critically handled by applying both technical and behavioral controls. However, security c... Read More about Need for information security policies compliance: a perspective in Higher Education Institutions.

Digital connectivity and sharing at school: Opportunities and security challenges of using social networking sites (2017)
Presentation / Conference
Hina, S., & Dominic, P. (2017, May). Digital connectivity and sharing at school: Opportunities and security challenges of using social networking sites. Presented at 2017 5th International Conference on Information and Communication Technology (ICoIC7), Melaka, Malaysia

The hi-tech instigation of social media, powered and enhanced by the unique participation/collaboration pattern has initiated an epoch of in-depth research practices in education, government and the corporate sector. Social Networking Sites (SNS) are... Read More about Digital connectivity and sharing at school: Opportunities and security challenges of using social networking sites.

Information security policies: investigation of compliance in universities (2016)
Presentation / Conference
Hina, S., & Dominic, P. (2016, August). Information security policies: investigation of compliance in universities. Presented at 2016 3rd International Conference on Computer and Information Sciences (ICCOINS), Kuala Lumpur, Malaysia

Information security awareness (ISA) is signified as a state of consciousness and acquaintance about the potential security issues/breaches and is found to have an association with security policies compliance in organizations. Many information secur... Read More about Information security policies: investigation of compliance in universities.

Engaging university students in hands on learning practices and social media collaboration (2016)
Presentation / Conference
Hina, S., & Dominic, P. (2016, August). Engaging university students in hands on learning practices and social media collaboration. Presented at 2016 3rd International Conference on Computer and Information Sciences (ICCOINS), Kuala Lumpur, Malaysia

This manuscript emphasizes on incorporating the hands on learning practices using information communication technology (ICT) tools and collaborative learning using social media technologies, in university educational courses such as Statistics & Empi... Read More about Engaging university students in hands on learning practices and social media collaboration.

A relational study of critical threats and risks affecting the potential usage of collaborative pattern (2016)
Journal Article
Hina, S., Dominic, P., & Ratnam, K. (2016). A relational study of critical threats and risks affecting the potential usage of collaborative pattern. Global Journal of Flexible Systems Management, 17, 373-388. https://doi.org/10.1007/s40171-016-0133-5

With increased variety of collaborative tools offering advanced features, knowledge sharing among professional and social peers has become independent of space and time. This paper identifies the potential of social networks for educational collabora... Read More about A relational study of critical threats and risks affecting the potential usage of collaborative pattern.

Gauging the school-based acceptability of Web 2.0 collaborative tools (2016)
Journal Article
Hina, S., & Dominic, P. (2016). Gauging the school-based acceptability of Web 2.0 collaborative tools. International Journal of Business Information Systems, 21(3), 321-341. https://doi.org/10.1504/ijbis.2016.074761

This article develops an insight of the factors affecting the use of social networking sites (SNSs) for mutual participation/collaboration among school stakeholders. Collaborative social networks that have a casual disregard for personal information... Read More about Gauging the school-based acceptability of Web 2.0 collaborative tools.

Participation/collaboration pattern: Perspectives of trust and security risks (2014)
Presentation / Conference
Hina, S., & Oxley, A. (2014, June). Participation/collaboration pattern: Perspectives of trust and security risks. Presented at 2014 International Conference on Computer and Information Sciences (ICCOINS), Kuala Lumpur, Malaysia

Cyber security issues, due to a lack of trust in social networking sites (SNS), are being addressed by many researchers and practitioners. Despite the diversity of security and privacy vulnerabilities, SNS have acquired and are still acquiring great... Read More about Participation/collaboration pattern: Perspectives of trust and security risks.