Browsing NTNU Open by Author "Nweke, Livinus Obiora"
Now showing items 1-20 of 24
-
A Framework for the Validation of Network Artifacts
Nweke, Livinus Obiora (Journal article; Peer reviewed, 2019) -
A Review of Asset-Centric Threat Modelling Approaches
Nweke, Livinus Obiora; Wolthusen, Stephen (Journal article; Peer reviewed, 2020)Abstract: The threat landscape is constantly evolving. As attackers continue to evolve and seek better methods of compro-mising a system; in the same way, defenders continue to evolve and seek better methods of protecting ... -
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen (Peer reviewed; Journal article, 2020)Adversarial models are well-established for cryptographic protocols, but distributed real-time protocols have requirements that these abstractions are not intended to cover. The IEEE/IEC 61850 standard for communication ... -
Applying software‑defined networking to support telemedicine health consultation during and post Covid‑19 era
Bokolo, Anthony Junior; Nweke, Livinus Obiora (Peer reviewed; Journal article, 2020)The novel coronavirus disease-19 (COVID-19) infection has altered the society, economy, and entire healthcare system. Whilst this pandemic has presented the healthcare system with unprecedented challenges, it has rapidly ... -
Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study
Yeng, Prosper; Nweke, Livinus Obiora; Yang, Bian; Fauzi, Muhammad Ali; Snekkenes, Einar Arthur (Peer reviewed; Journal article, 2021)Background: Blocklisting malicious activities in health care is challenging in relation to access control in health care security practices due to the fear of preventing legitimate access for therapeutic reasons. Inadvertent ... -
A comparison of primary stakeholders views on the deployment of biometrics technology in border management: Case study of smart mobility at the European land borders
Abomhara, Mohamed; Yildirim Yayilgan, Sule; Nweke, Livinus Obiora; Székely, Zoltán (Peer reviewed; Journal article, 2021)Advances in technology have a substantial impact on every aspect of our lives, ranging from the way we communicate to the way we travel. The Smart mobility at the European land borders (SMILE) project is geared towards the ... -
Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review
Yeng, Prosper; Nweke, Livinus Obiora; Woldaregay, Ashenafi Zebene; Yang, Bian; Snekkenes, Einar Arthur (Peer reviewed; Journal article, 2020)Data breaches in healthcare continue to grow exponentially, calling for a rethinking into better approaches of security measures towards mitigating the menace. Traditional approaches including technological measures, have ... -
Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by design
Abomhara, Mohamed Ali Saleh; Nweke, Livinus Obiora; Yildirim-Yayilgan, Sule; Comparin, Debora; Teyras, Kristel; de Labriolle, Stéphanie (Journal article; Peer reviewed, 2024)Privacy by Design (PbD) is a well-known concept that aims to provide a high level of protection for privacy throughout the entire life cycle of systems development. Despite the considerable attention from stakeholders such ... -
The Ethics of Information Systems: The Present State of the Discussion and Avenues for Future Work
Bock, Alexander C.; España, Sergio; Gulden, Jens; Jahn, Katharina; Nweke, Livinus Obiora; Richter, Andreas (Chapter, 2021)Despite occasional pleas to incorporate the ethics of information systems into the field’s research agenda, the analysis of the moral ramifications of information systems has remained unsystematic in nature. Work on a ... -
A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda
Nweke, Livinus Obiora; Wolthusen, Stephen (Peer reviewed; Journal article, 2020)Critical infrastructure is an asset or a system that is essential for the maintenance of vital societal functions. The protection of such an infrastructure requires more than a technical understanding of the underlying ... -
Investigating the effectiveness of a HyFlex cyber security training in a developing country: A case study
Nweke, Livinus Obiora; Bokolo, Anthony Junior; Mba, Gibson; Nwigwe, Emeka (Peer reviewed; Journal article, 2022)HyFlex termed as hybrid-flexibility is a teaching approach where teachers and students have the alternative to participate in planned courses either remotely or face-to-face. This study examines the effectiveness of the ... -
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection
Nweke, Livinus Obiora; Wolthusen, Stephen (Peer reviewed; Journal article, 2020)The menace of cyber attacks has become a concern for both the public and private sectors. Several approaches have been proposed to tackle the challenge, but an approach that has received widespread acceptance among cyber ... -
A LINDDUN-Based Privacy Threat Modelling for National Identification Systems
Nweke, Livinus Obiora; Abomhara, Mohamed; Yildirim Yayilgan, Sule; Camparin, Debora; Heurtier, Olivier; Bunney, Calum (Chapter, 2022)The international focus on attaining identity for all has fostered advances in technological developments that have given rise to changing demands on the architecture and deployment of national identification (NID) systems. ... -
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model
Nweke, Livinus Obiora; Wolthusen, Stephen (Chapter, 2020)In recent years, software defined networking (SDN) has been proposed for enhancing the security of industrial control networks. However, its ability to guarantee the quality of service (QoS) requirements of such networks ... -
Promoting Learners’ Engagement to Maximize Learning in a Synchronous Online Workshop: A Case Study Analysis from Different Perspectives
Nweke, Livinus Obiora (Chapter, 2023)As cloud computing becomes increasingly popular, the need for professionals with cyber security expertise for cloud platforms has become crucial. Continuous education initiatives are vital for ensuring that professionals ... -
Resilience Analysis of Software-Defined Networks Using Queueing Networks
Nweke, Livinus Obiora (Peer reviewed; Journal article, 2019)Software-Defined Networks (SDN) are being adopted widely and are also likely to be deployed as the infrastructure of systems with critical real-time properties such as Industrial Control Systems (ICS). This raises the ... -
Resilience Analysis of Software-Defined Networks Using Queueing Networks
Nweke, Livinus Obiora; Wolthusen, Stephen (Chapter, 2020)Software-Defined Networks (SDN) are being adopted widely and are also likely to be deployed as the infrastructure of systems with critical real-time properties such as Industrial Control Systems (ICS). This raises the ... -
A Survey of Specification-based Intrusion Detection Techniques for Cyber-Physical Systems
Nweke, Livinus Obiora (Peer reviewed; Journal article, 2021)Cyber-physical systems (CPS) integrate computation and communication capabilities to monitor and control physical systems. Even though this integration improves the performance of the overall system and facilitates the ... -
System security assurance: A systematic literature review
Shukla, Ankur; Katt, Basel; Nweke, Livinus Obiora; Yeng, Prosper; Weldehawaryat, Goitom Kahsay (Peer reviewed; Journal article, 2022)System security assurance provides the confidence that security features, practices, procedures, and architecture of software systems mediate and enforce the security policy and are resilient against security failure and ... -
Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus
Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn (Peer reviewed; Journal article, 2021)Cyber–Physical Systems (CPS) are distributed systems in which the state of the physical system is generally not observable in non-trivial cases, and where state transitions of this physical system can also occur without ...