Follow
Ying He
Title
Cited by
Cited by
Year
Human behaviour as an aspect of cybersecurity assurance
M Evans, LA Maglaras, Y He, H Janicke
Security and Communication Networks 9 (17), 4667-4679, 2016
1522016
Social internet of vehicles for smart cities
LA Maglaras, AH Al-Bayatti, Y He, I Wagner, H Janicke
Journal of Sensor and Actuator Networks 5 (1), 3, 2016
1282016
Smart cities and cyber security: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership
M Vitunskaite, Y He, T Brandstetter, H Janicke
Computers & Security 83, 313-331, 2019
672019
HEART-IS: A novel technique for evaluating human error-related information security incidents
M Evans, Y He, L Maglaras, H Janicke
Computers & Security 80, 74-89, 2019
662019
Internet of cloud: Security and privacy issues
A Cook, M Robinson, MA Ferrag, LA Maglaras, Y He, K Jones, H Janicke
Cloud Computing for Optimization: Foundations, Applications, and Challenges …, 2018
612018
On the security risks of the blockchain
E Zamani, Y He, M Phillips
Journal of Computer Information Systems, 2018
422018
A holistic cybersecurity maturity assessment framework for higher education institutions in the United Kingdom
A Aliyu, L Maglaras, Y He, I Yevseyeva, E Boiten, A Cook, H Janicke
Applied Sciences 10 (10), 3660, 2020
302020
Challenges of information security incident learning: an industrial case study in a Chinese healthcare organization
Y He, C Johnson
Informatics for Health and Social Care 42 (4), 393-408, 2017
282017
Generic security cases for information system security in healthcare systems
Y He, CW Johnson
7th IET International Conference on System Safety, incorporating the Cyber …, 2012
282012
Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector
M Evans, Y He, L Maglaras, I Yevseyeva, H Janicke
International journal of medical informatics 127, 109-119, 2019
272019
Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review
Y He, A Aliyu, M Evans, C Luo
Journal of medical Internet research 23 (4), e21747, 2021
252021
Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form
M Evans, Y He, C Luo, I Yevseyeva, H Janicke, LA Maglaras
IEEE Access 7, 102087-102101, 2019
232019
Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template
Y He, C Johnson
International journal of medical informatics 84 (11), 941-949, 2015
222015
A novel algorithm for course learning object recommendation based on student learning styles
SM Nafea, F Siewe, Y He
2019 International Conference on Innovative Trends in Computer Engineering …, 2019
212019
On recommendation of learning objects using felder-silverman learning style model
SM Nafea, F Siewe, Y He
IEEE Access 7, 163034-163048, 2019
202019
A security architectural pattern for risk management of industry control systems within critical national infrastructure
A Wood, Y He, L Maglaras, H Janicke
Inderscience, 2017
202017
An empirical study on the use of the generic security template for structuring the lessons from information security incidents
Y He, C Johnson, K Renaud, Y Lu, S Jebriel
2014 6th International Conference on Computer Science and Information …, 2014
172014
User interface design for privacy awareness in eHealth technologies
I Wagner, Y He, D Rosenberg, H Janicke
2016 13th IEEE annual consumer communications & networking conference (CCNC …, 2016
152016
Decreased regional homogeneity and increased functional connectivity of default network correlated with neurocognitive deficits in subjects with genetic high-risk for …
X Ma, W Zheng, C Li, Z Li, J Tang, L Yuan, L Ouyang, K Jin, Y He, X Chen
Psychiatry research 281, 112603, 2019
132019
A game-theoretic based qos-aware capacity management for real-time edgeiot applications
SO Aliyu, F Chen, Y He, H Yang
2017 IEEE International Conference on Software Quality, Reliability and …, 2017
132017
The system can't perform the operation now. Try again later.
Articles 1–20