Skip to main content

Research Repository

Advanced Search

All Outputs (12)

Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees (2023)
Journal Article
Faizan Ali, R., Dominic, P. D. D., Hina, S., & Naseer, S. (in press). Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees. International Journal of Information Security, https://doi.org/10.1007/s10207-023-00786-9

Oil and gas (O&G) organizations are progressively being digitalized in order to facilitate substantial information flow to remain competitive in the information age. This critical sector is spearheading the establishment of technical security measure... Read More about Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees.

CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning (2023)
Journal Article
Ahmed, K., Khurshid, S. K., & Hina, S. (2024). CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning. Computers and Security, 136, 103579. https://doi.org/10.1016/j.cose.2023.103579

The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense strategies for security professionals. These are built from cyber threat intelligence data based on relation triples where each relation triple contains two e... Read More about CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning.

Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems (2023)
Journal Article
Abbas, Q., Hina, S., Sajjad, H., Zaidi, K. S., & Akbar, R. (in press). Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems. PeerJ Computer Science, 9, e1552. https://doi.org/10.7717/peerj-cs.1552

Network intrusion is one of the main threats to organizational networks and systems. Its timely detection is a profound challenge for the security of networks and systems. The situation is even more challenging for small and medium enterprises (SMEs)... Read More about Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems.

An intelligent context-aware threat detection and response model for smart cyber-physical systems (2023)
Journal Article
Noor, Z., Hina, S., Hayat, F., & Shah, G. A. (2023). An intelligent context-aware threat detection and response model for smart cyber-physical systems. Internet of Things, 23, 100843. https://doi.org/10.1016/j.iot.2023.100843

Smart cities, businesses, workplaces, and even residences have all been converged by the Internet of Things (IoT). The types and characteristics of these devices vary depending on the industry 4.0 and have rapidly increased recently... Read More about An intelligent context-aware threat detection and response model for smart cyber-physical systems.

Agentless approach for security information and event management in industrial IoT (2023)
Journal Article
Zahid, H., Hina, S., Hayat, M., & Shah, G. (in press). Agentless approach for security information and event management in industrial IoT. Electronics, 12(8), 1831. https://doi.org/10.3390/electronics12081831

The Internet of Things (IoT) provides ease of real-time communication in homes, industries, health care, and many other dependable and interconnected sectors. However, in recent years, smart infrastructure, including cyber-physical industries, has wi... Read More about Agentless approach for security information and event management in industrial IoT.

Threat modeling in smart firefighting systems: aligning MITRE ATT&CK Matrix and NIST security controls (2023)
Journal Article
Zahid, S., Mazhar, M., Abbas, S., Hanif, Z., Hina, S., & Shah, G. (in press). Threat modeling in smart firefighting systems: aligning MITRE ATT&CK Matrix and NIST security controls. Internet of Things, 22, https://doi.org/10.1016/j.iot.2023.100766

Industrial automation technologies are envisioned as multi-device systems that are constantly interacting with one another and with enterprise systems. In these industrial systems, the industrial internet of things (IIoT) significantly improves syste... Read More about Threat modeling in smart firefighting systems: aligning MITRE ATT&CK Matrix and NIST security controls.

An automated context-aware IoT vulnerability assessment rule-set generator (2022)
Journal Article
Hashmat, F., Abbas, S., Hina, S., Shah, G., Bakhshi, T., & Abbas, W. (2022). An automated context-aware IoT vulnerability assessment rule-set generator. Computer Communications, 186, 133-152. https://doi.org/10.1016/j.comcom.2022.01.022

While introducing unprecedented applications, Internet of Things (IoT) has simultaneously provoked acute security challenges, in the form of the vulnerabilities. Mainly because manufacturers overlook the security considerations and produce devices th... Read More about An automated context-aware IoT vulnerability assessment rule-set generator.

Beyond the horizon, backhaul connectivity for offshore IoT devices (2021)
Journal Article
Shabih Zaidi, K., Hina, S., Jawad, M., Nawaz Khan, A., & Nawaz, R. (2021). Beyond the horizon, backhaul connectivity for offshore IoT devices. Energies, 14(21), https://doi.org/10.3390/en14216918

The prevalent use of the Internet of Things (IoT) devices over the Sea, such as, on oil and gas platforms, cargo, and cruise ships, requires high-speed connectivity of these devices. Although satellite based backhaul links provide vast coverage, but... Read More about Beyond the horizon, backhaul connectivity for offshore IoT devices.

Institutional governance and protection motivation: theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world (2019)
Journal Article
Hina, S., Dominic, P., & Lowry, P. (2019). Institutional governance and protection motivation: theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world. Computers and Security, 87, https://doi.org/10.1016/j.cose.2019.101594

Higher education institutions (HEIs) are progressively computerized to deal with substantial academic and operational information. With the increase in enriched information systems (IS) comes the potential hazard of malicious exposure to internal and... Read More about Institutional governance and protection motivation: theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world.

Information security policies’ compliance: a perspective for higher education institutions (2018)
Journal Article
Hina, S., & Dominic, P. (2018). Information security policies’ compliance: a perspective for higher education institutions. Journal of Computer Information Systems, 60(3), 201-211. https://doi.org/10.1080/08874417.2018.1432996

This paper provides a systematic literature review in the information security policies’ compliance (ISPC) field, with respect to information security culture, information security awareness, and information security management exploring in various s... Read More about Information security policies’ compliance: a perspective for higher education institutions.

A relational study of critical threats and risks affecting the potential usage of collaborative pattern (2016)
Journal Article
Hina, S., Dominic, P., & Ratnam, K. (2016). A relational study of critical threats and risks affecting the potential usage of collaborative pattern. Global Journal of Flexible Systems Management, 17, 373-388. https://doi.org/10.1007/s40171-016-0133-5

With increased variety of collaborative tools offering advanced features, knowledge sharing among professional and social peers has become independent of space and time. This paper identifies the potential of social networks for educational collabora... Read More about A relational study of critical threats and risks affecting the potential usage of collaborative pattern.

Gauging the school-based acceptability of Web 2.0 collaborative tools (2016)
Journal Article
Hina, S., & Dominic, P. (2016). Gauging the school-based acceptability of Web 2.0 collaborative tools. International Journal of Business Information Systems, 21(3), 321-341. https://doi.org/10.1504/ijbis.2016.074761

This article develops an insight of the factors affecting the use of social networking sites (SNSs) for mutual participation/collaboration among school stakeholders. Collaborative social networks that have a casual disregard for personal information... Read More about Gauging the school-based acceptability of Web 2.0 collaborative tools.