Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study

There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to identify and analyze the common cyber security vulnerabilities. To achieve this goal, a systematic...

Full description

Saved in:
Bibliographic Details
Published in:Arabian journal for science and engineering (2011) Vol. 45; no. 4; pp. 3171 - 3189
Main Authors: Humayun, Mamoona, Niazi, Mahmood, Jhanjhi, NZ, Alshayeb, Mohammad, Mahmood, Sajjad
Format: Journal Article
Language:English
Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2020
Springer Nature B.V
Subjects:
ISSN:2193-567X, 1319-8025, 2191-4281
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to identify and analyze the common cyber security vulnerabilities. To achieve this goal, a systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed. After a detailed analysis of the selected studies, we identified the important security vulnerabilities and their frequency of occurrence. Data were also synthesized and analyzed to present the venue of publication, country of publication, key targeted infrastructures and applications. The results show that the security approaches mentioned so far only target security in general, and the solutions provided in these studies need more empirical validation and real implementation. In addition, our results show that most of the selected studies in this review targeted only a few common security vulnerabilities such as phishing, denial-of-service and malware. However, there is a need, in future research, to identify the key cyber security vulnerabilities, targeted/victimized applications, mitigation techniques and infrastructures, so that researchers and practitioners could get a better insight into it.
AbstractList There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to identify and analyze the common cyber security vulnerabilities. To achieve this goal, a systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed. After a detailed analysis of the selected studies, we identified the important security vulnerabilities and their frequency of occurrence. Data were also synthesized and analyzed to present the venue of publication, country of publication, key targeted infrastructures and applications. The results show that the security approaches mentioned so far only target security in general, and the solutions provided in these studies need more empirical validation and real implementation. In addition, our results show that most of the selected studies in this review targeted only a few common security vulnerabilities such as phishing, denial-of-service and malware. However, there is a need, in future research, to identify the key cyber security vulnerabilities, targeted/victimized applications, mitigation techniques and infrastructures, so that researchers and practitioners could get a better insight into it.
There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to identify and analyze the common cyber security vulnerabilities. To achieve this goal, a systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed. After a detailed analysis of the selected studies, we identified the important security vulnerabilities and their frequency of occurrence. Data were also synthesized and analyzed to present the venue of publication, country of publication, key targeted infrastructures and applications. The results show that the security approaches mentioned so far only target security in general, and the solutions provided in these studies need more empirical validation and real implementation. In addition, our results show that most of the selected studies in this review targeted only a few common security vulnerabilities such as phishing, denial-of-service and malware. However, there is a need, in future research, to identify the key cyber security vulnerabilities, targeted/victimized applications, mitigation techniques and infrastructures, so that researchers and practitioners could get a better insight into it.
Author Jhanjhi, NZ
Mahmood, Sajjad
Alshayeb, Mohammad
Niazi, Mahmood
Humayun, Mamoona
Author_xml – sequence: 1
  givenname: Mamoona
  surname: Humayun
  fullname: Humayun, Mamoona
  organization: Department of Information systems, College of Computer and Information Sciences, Jouf University
– sequence: 2
  givenname: Mahmood
  surname: Niazi
  fullname: Niazi, Mahmood
  organization: Information and Computer Science Department, King Fahd University of Petroleum and Minerals (KFUPM)
– sequence: 3
  givenname: NZ
  orcidid: 0000-0001-8116-4733
  surname: Jhanjhi
  fullname: Jhanjhi, NZ
  email: noorzaman.jhanjhi@taylors.edu.my
  organization: SoCIT, Taylor’s University
– sequence: 4
  givenname: Mohammad
  surname: Alshayeb
  fullname: Alshayeb, Mohammad
  organization: Information and Computer Science Department, King Fahd University of Petroleum and Minerals (KFUPM)
– sequence: 5
  givenname: Sajjad
  surname: Mahmood
  fullname: Mahmood, Sajjad
  organization: Information and Computer Science Department, King Fahd University of Petroleum and Minerals (KFUPM)
BookMark eNp9UMtOwzAQtFCRKKU_wMkS54AdJ47Nrap4SUUcWhA3y3E2xahNgu0c8veYBgmJQw_7kHZmdjTnaNK0DSB0Sck1JaS48ZQxLhNCY2Us9vQETVMqaZKlgk4OO0tyXryfobn3tiSZYDKnlE3R_XIoweE1mN7ZMODNhwMdPNZNhd_6XQNOl3ZngwV_ixd4PfgAex2swc-662yzxevQV8MFOq31zsP8d87Q6_3dZvmYrF4enpaLVWKir5CkFUCZUyOFEAXVRIMBkrKcZzkYwwnJOBUpLUsuNRVSMsmhqotas7ysUybYDF2Nup1rv3rwQX22vWviSxXPXGZ51IgoMaKMa713UCtjQzTdNsFpu1OUqJ_g1BicisGpQ3BRY4bSf9TO2b12w3ESG0k-gpstuD9XR1jf09OBjA
CitedBy_id crossref_primary_10_1002_int_23088
crossref_primary_10_1007_s43621_024_00754_w
crossref_primary_10_1007_s11042_021_11350_9
crossref_primary_10_1177_00195561241257388
crossref_primary_10_1145_3768582
crossref_primary_10_1007_s11276_023_03436_z
crossref_primary_10_1007_s10462_024_10823_1
crossref_primary_10_3390_electronics12061333
crossref_primary_10_3390_computation13020030
crossref_primary_10_1007_s42001_024_00269_4
crossref_primary_10_1016_j_techfore_2023_123028
crossref_primary_10_1007_s41125_021_00076_2
crossref_primary_10_3390_info13040192
crossref_primary_10_1007_s13369_021_06484_9
crossref_primary_10_1007_s13369_022_06954_8
crossref_primary_10_1016_j_ssaho_2024_101234
crossref_primary_10_4018_IJSEUS_309953
crossref_primary_10_1016_j_procs_2024_06_060
crossref_primary_10_1109_ACCESS_2022_3204051
crossref_primary_10_1109_ACCESS_2023_3235900
crossref_primary_10_3390_fi15070231
crossref_primary_10_3390_computers11090137
crossref_primary_10_1109_ACCESS_2022_3221434
crossref_primary_10_3390_computers11120181
crossref_primary_10_1109_ACCESS_2024_3477979
crossref_primary_10_1007_s10586_024_04422_6
crossref_primary_10_1057_s41283_020_00063_2
crossref_primary_10_3390_electronics12173610
crossref_primary_10_3390_app15073898
crossref_primary_10_1007_s12652_020_02804_3
crossref_primary_10_3390_s23177541
crossref_primary_10_1002_smr_2346
crossref_primary_10_1007_s42452_022_05019_7
crossref_primary_10_3390_electronics10243065
crossref_primary_10_1108_ICS_12_2022_0195
crossref_primary_10_1016_j_adhoc_2020_102096
crossref_primary_10_1109_ACCESS_2025_3551887
crossref_primary_10_3390_info14090485
crossref_primary_10_3390_fi15080256
crossref_primary_10_1109_ACCESS_2022_3207272
crossref_primary_10_1109_ACCESS_2021_3094517
crossref_primary_10_1038_s41598_025_10291_9
crossref_primary_10_1002_spe_3175
crossref_primary_10_1002_ase_2385
crossref_primary_10_1016_j_cose_2023_103128
crossref_primary_10_1007_s11416_021_00414_x
crossref_primary_10_59395_ijadis_v6i2_1404
crossref_primary_10_1016_j_apenergy_2025_125317
crossref_primary_10_32604_cmc_2021_017199
crossref_primary_10_3390_s20215997
crossref_primary_10_1142_S0219649220500173
crossref_primary_10_22201_dgtic_ctud_2024_2_4_71
crossref_primary_10_1016_j_chb_2022_107376
crossref_primary_10_3390_electronics12173629
crossref_primary_10_1016_j_future_2024_06_050
crossref_primary_10_3390_electronics10091092
crossref_primary_10_1080_08874417_2021_2004566
crossref_primary_10_3390_cryptography9020026
crossref_primary_10_3390_healthcare13070817
crossref_primary_10_1093_iwc_iwae048
crossref_primary_10_1007_s11235_023_01039_9
crossref_primary_10_1016_j_csa_2023_100031
crossref_primary_10_1109_ACCESS_2023_3251354
crossref_primary_10_1016_j_compeleceng_2022_107868
crossref_primary_10_32604_cmc_2022_019289
crossref_primary_10_1016_j_asoc_2024_112663
crossref_primary_10_1109_ACCESS_2021_3055209
crossref_primary_10_1007_s11042_022_14036_y
crossref_primary_10_1007_s10791_025_09543_z
crossref_primary_10_1016_j_matpr_2021_03_417
crossref_primary_10_1365_s43439_024_00120_6
crossref_primary_10_1007_s13369_023_08016_z
crossref_primary_10_1111_risa_14004
Cites_doi 10.1016/j.infsof.2016.11.004
10.1109/ICSE.2009.5070521
10.14236/ewic/EASE2010.4
10.1007/s13369-015-1586-0
10.1177/1049731509351988
10.1016/j.comnet.2018.07.028
10.1007/s13198-012-0125-6
10.1016/j.cose.2011.08.004
10.4324/9780429500084
10.1109/ISADS.2013.6513420
10.1007/978-3-642-33018-6_18
10.1016/S1361-3723(12)70007-6
10.1016/j.csi.2016.10.001
10.1145/3184898
10.1016/j.cose.2014.06.008
10.1145/1134285.1134500
10.4018/978-1-5225-4053-3.ch016
10.1111/j.1468-2478.2009.00572.x
10.4018/978-1-5225-5634-3.ch032
10.13052/jcsm2245-1439.414
10.1016/j.jss.2004.06.004
10.1145/1368088.1368112
10.1007/978-3-319-70290-2_7
10.1108/ICS-04-2017-0025
10.1016/j.infsof.2015.03.007
10.1016/j.infsof.2014.07.010
10.1016/j.cose.2006.10.009
10.1080/01402390.2014.977382
10.1016/j.compind.2018.04.017
10.1108/K-12-2014-0283
10.1109/ACCESS.2018.2840322
10.1109/ASONAM.2016.7752338
10.1016/j.cose.2013.04.004
10.1016/j.jss.2015.06.005
10.1109/TSG.2016.2570546
10.1145/2897053.2897069
10.1109/TAC.2015.2409905
ContentType Journal Article
Copyright King Fahd University of Petroleum & Minerals 2020
King Fahd University of Petroleum & Minerals 2020.
Copyright_xml – notice: King Fahd University of Petroleum & Minerals 2020
– notice: King Fahd University of Petroleum & Minerals 2020.
DBID AAYXX
CITATION
DOI 10.1007/s13369-019-04319-2
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2191-4281
EndPage 3189
ExternalDocumentID 10_1007_s13369_019_04319_2
GrantInformation_xml – fundername: King Fahd University of Petroleum and Minerals
  grantid: IN161024
  funderid: http://dx.doi.org/10.13039/501100004055
GroupedDBID -EM
0R~
203
2KG
406
AAAVM
AACDK
AAHNG
AAIAL
AAJBT
AANZL
AARHV
AASML
AATNV
AATVU
AAUYE
AAYTO
AAYZH
ABAKF
ABDBF
ABDZT
ABECU
ABFTD
ABFTV
ABJNI
ABJOX
ABKCH
ABMQK
ABQBU
ABSXP
ABTEG
ABTKH
ABTMW
ABXPI
ACAOD
ACBXY
ACDTI
ACHSB
ACMDZ
ACMLO
ACOKC
ACPIV
ACUHS
ACZOJ
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEJRE
AEMSY
AEOHA
AESKC
AEVLU
AEXYK
AFBBN
AFLOW
AFQWF
AGAYW
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AHAVH
AHBYD
AHSBF
AIAKS
AIGIU
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALFXC
ALMA_UNASSIGNED_HOLDINGS
AMXSW
AMYLF
AOCGG
AXYYD
BGNMA
CSCUP
DDRTE
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESX
FERAY
FIGPU
FINBP
FNLPD
FSGXE
GGCAI
GQ6
GQ7
H13
HG6
I-F
IKXTQ
IWAJR
J-C
JBSCW
JZLTJ
L8X
LLZTM
M4Y
MK~
NPVJJ
NQJWS
NU0
O9J
PT4
ROL
RSV
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
TSG
TUS
UOJIU
UTJUX
UZXMN
VFIZW
Z5O
Z7R
Z7V
Z7X
Z7Y
Z7Z
Z81
Z83
Z85
Z88
ZMTXR
~8M
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
AEZWR
AFDZB
AFHIU
AFOHR
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
06D
0VY
23M
29~
2KM
30V
408
5GY
96X
AAJKR
AARTL
AAYIU
AAYQN
AAZMS
ABTHY
ACGFS
ACKNC
ADHHG
ADHIR
AEGNC
AEJHL
AENEX
AEPYU
AETCA
AFWTZ
AFZKB
AGDGC
AGWZB
AGYKE
AHYZX
AIIXL
AMKLP
AMYQR
ANMIH
AYJHY
ESBYG
FFXSO
FRRFC
FYJPI
GGRSB
GJIRD
GX1
HMJXF
HRMNR
HZ~
I0C
IXD
J9A
KOV
O93
OVT
P9P
R9I
RLLFE
S27
S3B
SEG
SHX
T13
U2A
UG4
VC2
W48
WK8
~A9
ID FETCH-LOGICAL-c319t-2deeb51c988871a0aece0235645ecc600461821bb69a1899396edf7fa35bf2383
IEDL.DBID RSV
ISICitedReferencesCount 97
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000524444000051&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2193-567X
1319-8025
IngestDate Mon Jun 30 09:05:55 EDT 2025
Tue Nov 18 21:29:46 EST 2025
Sat Nov 29 02:51:30 EST 2025
Fri Feb 21 02:36:50 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Threats
Attack
Vulnerabilities
Cyber security
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-2deeb51c988871a0aece0235645ecc600461821bb69a1899396edf7fa35bf2383
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-8116-4733
PQID 2386945004
PQPubID 2044268
PageCount 19
ParticipantIDs proquest_journals_2386945004
crossref_citationtrail_10_1007_s13369_019_04319_2
crossref_primary_10_1007_s13369_019_04319_2
springer_journals_10_1007_s13369_019_04319_2
PublicationCentury 2000
PublicationDate 2020-04-01
PublicationDateYYYYMMDD 2020-04-01
PublicationDate_xml – month: 04
  year: 2020
  text: 2020-04-01
  day: 01
PublicationDecade 2020
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
– name: Heidelberg
PublicationTitle Arabian journal for science and engineering (2011)
PublicationTitleAbbrev Arab J Sci Eng
PublicationYear 2020
Publisher Springer Berlin Heidelberg
Springer Nature B.V
Publisher_xml – name: Springer Berlin Heidelberg
– name: Springer Nature B.V
References RamakiAARasoolzadeganABafghiAGA systematic mapping study on intrusion alert analysis in intrusion detection systemsACM Comput. Surv. (CSUR)20185135510.1145/3184898
ChooK-KRThe cyber threat landscape: challenges and future research directionsComput. Secur.201130871973110.1016/j.cose.2011.08.004
BenedicktMCyberspace: First Steps1991CambridgeMIT Press
GunkelDJHacking Cyberspace2018AbingdonRoutledge10.4324/9780429500084
SharmaPJohariRSarmaSIntegrated approach to prevent SQL injection attack and reflected cross site scripting attackInt. J. Syst. Assur. Eng. Manag.20123434335110.1007/s13198-012-0125-6
MohammedNMExploring software security approaches in software development lifecycle: a systematic mapping studyComput. Stand. Interfaces20175010711510.1016/j.csi.2016.10.001
KuehlDTFrom cyberspace to cyberpower: Defining the problemCyberpower and National Security2009Washington, D.CNational Defense University Press
DodgeRCJrCarverCFergusonAJPhishing for user security awarenessComput. Secur.2007261738010.1016/j.cose.2006.10.009
ZhangHOptimal denial-of-service attack scheduling with energy constraintIEEE Trans. Autom. Control2015601130233028341959310.1109/TAC.2015.2409905
EnochSYA systematic evaluation of cybersecurity metrics for dynamic networksComput. Netw.201814421622910.1016/j.comnet.2018.07.028
HydaraICurrent state of research on cross-site scripting (XSS)—a systematic literature reviewInf. Softw. Technol.20155817018610.1016/j.infsof.2014.07.010
AlguliyevRImamverdiyevYSukhostatLCyber-physical systems and their security issuesComput. Ind.201810021222310.1016/j.compind.2018.04.017
Chong, R.: Quick reference guide to endnote (2018)
AbomharaMKøienGMCyber security and the internet of things: vulnerabilities, threats, intruders and attacksJ. Cyber Secur.201541658810.13052/jcsm2245-1439.414
Kustarz, C.: et al.: System and method for denial of service attack mitigation using cloud services. Google Patents (2016)
LewisGLagoPArchitectural tactics for cyber-foraging: results of a systematic literature reviewJ. Syst. Softw.201510715818610.1016/j.jss.2015.06.005
Niemelä, J.; Hyppönen, M.; Kangas, S.: Malware protection. Google Patents (2016)
Chockalingam, S.; et al.: Bayesian network models in cyber security: a systematic review. In: Nordic Conference on Secure IT Systems. Springer (2017)
Budgen, D.; Brereton, P.: Performing systematic literature reviews in software engineering. In: Proceedings of the 28th International Conference on Software Engineering. ACM (2006)
Ron, M.: Situational status of global cybersecurity and cyber defense according to global indicators. Adaptation of a model for ecuador. In: Developments and Advances in Defense and Security: Proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS 2018). Springer (2018)
Lun, Y.Z.; et al.: Cyber-physical systems security: a systematic mapping study. arXiv:1605.09641 (2016)
Von SolmsRVan NiekerkJFrom information security to cyber securityComput. Secur.2013389710210.1016/j.cose.2013.04.004
MuftiYA readiness model for security requirements engineeringIEEE Access20186286112863110.1109/ACCESS.2018.2840322
RahimNHAA systematic review of approaches to assessing cybersecurity awarenessKybernetes2015444606622333752110.1108/K-12-2014-0283
Mittal, S.; et al.: Cybertwitter: using twitter to generate alerts for cybersecurity threats and vulnerabilities. In: Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. IEEE Press (2016)
Kitchenham, B.A.; Budgen, D.; Brereton, O.P.: The value of mapping studies-A participant-observer case study. In: EASE (2010)
JohnsonCGuide to cyber threat information sharingNIST Spec. Publ.2016800150
Muccini, H.; Sharaf, M.; Weyns, D.:. Self-adaptation for cyber-physical systems: a systematic literature review. In: Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-managing Systems. ACM (2016)
TahaAFRisk mitigation for dynamic state estimation against cyber attacks and unknown inputsIEEE Trans. Smart Grid20189288689910.1109/TSG.2016.2570546
RidTBuchananBAttributing cyber attacksJ. Strateg. Stud.2015381–243710.1080/01402390.2014.977382
Al MazariACyber terrorism taxonomies: definition, targets, patterns, risk factors, and mitigation strategiesCyber Security and Threats: Concepts, Methodologies, Tools, and Applications2018HersheyIGI Global60862110.4018/978-1-5225-5634-3.ch032
BrarHSKumarGCybercrimes: a proposed taxonomy and challengesJ. Comput. Netw. Commun.20182018
PetersenKVakkalankaSKuzniarzLGuidelines for conducting systematic mapping studies in software engineering: an updateInf. Softw. Technol.20156411810.1016/j.infsof.2015.03.007
Floyd, D.H.; Shelton, J.W.; Bush, J.E.: Systems and methods for detecting a security breach in an aircraft network. Google Patents (2018)
NguyenPHAliSYueTModel-based security engineering for cyber-physical systems: a systematic mapping studyInf. Softw. Technol.20178311613510.1016/j.infsof.2016.11.004
Wassermann, G.; Su, Z.: Static detection of cross-site scripting vulnerabilities. In: Proceedings of the 30th International Conference on Software Engineering. ACM (2008)
FrankeUBrynielssonJCyber situational awareness—a systematic review of the literatureComput. Secur.201446183110.1016/j.cose.2014.06.008
Kieyzun, A.; et al.: Automatic creation of SQL injection and cross-site scripting attacks. In: Proceedings of the 31st International Conference on Software Engineering. IEEE Computer Society (2009)
ParmarBProtecting against spear-phishingComput. Fraud Secur.20122012181110.1016/S1361-3723(12)70007-6
Choraś, M.; et al.: Correlation approach for SQL injection attacks detection. In: International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions. Springer (2013)
BanksWCCyber espionage and electronic surveillance: beyond the media coverageEmory L. J.201666513
NiaziMDo systematic literature reviews outperform informal literature reviews in the software engineering domain? An initial case studyArab. J. Sci. Eng.201540384585510.1007/s13369-015-1586-0
ValerianoBManessRCBrownCEckersleyRInternational relations theory and cyber securityThe Oxford Handbook of International Political Theory2018OxfordOxford University Press259
Razzaq, A.; et al.: Cyber security: threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. In: 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS). IEEE (2013)
MishnaFInterventions to prevent and reduce cyber abuse of youth: a systematic reviewRes. Soc. Work Pract.201121151410.1177/1049731509351988
BeechamSUsing an expert panel to validate a requirements process improvement modelJ. Syst. Softw.200576325127510.1016/j.jss.2004.06.004
Gill, R.S.; Smith, J.; Looi, M.H.; Clark, A.J.: Passive techniques for detecting session hijacking attacks in IEEE 802.11 wireless networks. In: Clark, A.J., Kerr, K., Mohay, G.M. (eds.) AusCERT Asia Pacific Information Technology Security Conference: Refereed R&D Stream, 22–26 May 2005, Gold Coast, Australia (2005)
von SolmsBvon SolmsRCybersecurity and information security—what goes where?Inf. Comput. Secur.20182612910.1108/ICS-04-2017-0025
Bada, M.; Sasse, A.M.; Nurse, J.R.: Cyber security awareness campaigns: why do they fail to change behaviour? arXiv:1901.02672 (2019)
HansenLNissenbaumHDigital disaster, cyber security, and the Copenhagen SchoolInt. Stud. Q.20095341155117510.1111/j.1468-2478.2009.00572.x
BensonVMcAlaneyJFrumkinLAEmerging threats for the human element and countermeasures in current cyber security landscapePsychological and Behavioral Examinations in Cyber Security2018HersheyIGI Global26627110.4018/978-1-5225-4053-3.ch016
C Johnson (4319_CR18) 2016; 800
B Parmar (4319_CR25) 2012; 2012
B von Solms (4319_CR9) 2018; 26
Y Mufti (4319_CR51) 2018; 6
4319_CR32
4319_CR30
S Beecham (4319_CR49) 2005; 76
4319_CR31
4319_CR35
U Franke (4319_CR43) 2014; 46
DT Kuehl (4319_CR13) 2009
L Hansen (4319_CR12) 2009; 53
K Petersen (4319_CR46) 2015; 64
RC Dodge Jr (4319_CR26) 2007; 26
SY Enoch (4319_CR39) 2018; 144
M Benedickt (4319_CR14) 1991
P Sharma (4319_CR27) 2012; 3
V Benson (4319_CR4) 2018
4319_CR22
DJ Gunkel (4319_CR15) 2018
I Hydara (4319_CR34) 2015; 58
4319_CR23
PH Nguyen (4319_CR33) 2017; 83
NHA Rahim (4319_CR38) 2015; 44
AA Ramaki (4319_CR40) 2018; 51
T Rid (4319_CR19) 2015; 38
H Zhang (4319_CR21) 2015; 60
4319_CR28
4319_CR6
R Alguliyev (4319_CR42) 2018; 100
4319_CR5
M Niazi (4319_CR47) 2015; 40
AF Taha (4319_CR7) 2018; 9
4319_CR2
4319_CR1
K-KR Choo (4319_CR24) 2011; 30
A Al Mazari (4319_CR11) 2018
WC Banks (4319_CR20) 2016; 66
4319_CR10
4319_CR17
HS Brar (4319_CR29) 2018; 2018
F Mishna (4319_CR36) 2011; 21
M Abomhara (4319_CR16) 2015; 4
NM Mohammed (4319_CR50) 2017; 50
4319_CR44
4319_CR41
4319_CR48
4319_CR45
B Valeriano (4319_CR8) 2018
R Von Solms (4319_CR3) 2013; 38
G Lewis (4319_CR37) 2015; 107
References_xml – reference: GunkelDJHacking Cyberspace2018AbingdonRoutledge10.4324/9780429500084
– reference: ZhangHOptimal denial-of-service attack scheduling with energy constraintIEEE Trans. Autom. Control2015601130233028341959310.1109/TAC.2015.2409905
– reference: NguyenPHAliSYueTModel-based security engineering for cyber-physical systems: a systematic mapping studyInf. Softw. Technol.20178311613510.1016/j.infsof.2016.11.004
– reference: AlguliyevRImamverdiyevYSukhostatLCyber-physical systems and their security issuesComput. Ind.201810021222310.1016/j.compind.2018.04.017
– reference: BensonVMcAlaneyJFrumkinLAEmerging threats for the human element and countermeasures in current cyber security landscapePsychological and Behavioral Examinations in Cyber Security2018HersheyIGI Global26627110.4018/978-1-5225-4053-3.ch016
– reference: Kieyzun, A.; et al.: Automatic creation of SQL injection and cross-site scripting attacks. In: Proceedings of the 31st International Conference on Software Engineering. IEEE Computer Society (2009)
– reference: Wassermann, G.; Su, Z.: Static detection of cross-site scripting vulnerabilities. In: Proceedings of the 30th International Conference on Software Engineering. ACM (2008)
– reference: Muccini, H.; Sharaf, M.; Weyns, D.:. Self-adaptation for cyber-physical systems: a systematic literature review. In: Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-managing Systems. ACM (2016)
– reference: RahimNHAA systematic review of approaches to assessing cybersecurity awarenessKybernetes2015444606622333752110.1108/K-12-2014-0283
– reference: MohammedNMExploring software security approaches in software development lifecycle: a systematic mapping studyComput. Stand. Interfaces20175010711510.1016/j.csi.2016.10.001
– reference: JohnsonCGuide to cyber threat information sharingNIST Spec. Publ.2016800150
– reference: Budgen, D.; Brereton, P.: Performing systematic literature reviews in software engineering. In: Proceedings of the 28th International Conference on Software Engineering. ACM (2006)
– reference: HydaraICurrent state of research on cross-site scripting (XSS)—a systematic literature reviewInf. Softw. Technol.20155817018610.1016/j.infsof.2014.07.010
– reference: FrankeUBrynielssonJCyber situational awareness—a systematic review of the literatureComput. Secur.201446183110.1016/j.cose.2014.06.008
– reference: Kitchenham, B.A.; Budgen, D.; Brereton, O.P.: The value of mapping studies-A participant-observer case study. In: EASE (2010)
– reference: MuftiYA readiness model for security requirements engineeringIEEE Access20186286112863110.1109/ACCESS.2018.2840322
– reference: Chong, R.: Quick reference guide to endnote (2018)
– reference: EnochSYA systematic evaluation of cybersecurity metrics for dynamic networksComput. Netw.201814421622910.1016/j.comnet.2018.07.028
– reference: Lun, Y.Z.; et al.: Cyber-physical systems security: a systematic mapping study. arXiv:1605.09641 (2016)
– reference: ParmarBProtecting against spear-phishingComput. Fraud Secur.20122012181110.1016/S1361-3723(12)70007-6
– reference: DodgeRCJrCarverCFergusonAJPhishing for user security awarenessComput. Secur.2007261738010.1016/j.cose.2006.10.009
– reference: Chockalingam, S.; et al.: Bayesian network models in cyber security: a systematic review. In: Nordic Conference on Secure IT Systems. Springer (2017)
– reference: BanksWCCyber espionage and electronic surveillance: beyond the media coverageEmory L. J.201666513
– reference: MishnaFInterventions to prevent and reduce cyber abuse of youth: a systematic reviewRes. Soc. Work Pract.201121151410.1177/1049731509351988
– reference: LewisGLagoPArchitectural tactics for cyber-foraging: results of a systematic literature reviewJ. Syst. Softw.201510715818610.1016/j.jss.2015.06.005
– reference: BeechamSUsing an expert panel to validate a requirements process improvement modelJ. Syst. Softw.200576325127510.1016/j.jss.2004.06.004
– reference: BenedicktMCyberspace: First Steps1991CambridgeMIT Press
– reference: SharmaPJohariRSarmaSIntegrated approach to prevent SQL injection attack and reflected cross site scripting attackInt. J. Syst. Assur. Eng. Manag.20123434335110.1007/s13198-012-0125-6
– reference: Razzaq, A.; et al.: Cyber security: threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. In: 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS). IEEE (2013)
– reference: ValerianoBManessRCBrownCEckersleyRInternational relations theory and cyber securityThe Oxford Handbook of International Political Theory2018OxfordOxford University Press259
– reference: Niemelä, J.; Hyppönen, M.; Kangas, S.: Malware protection. Google Patents (2016)
– reference: Gill, R.S.; Smith, J.; Looi, M.H.; Clark, A.J.: Passive techniques for detecting session hijacking attacks in IEEE 802.11 wireless networks. In: Clark, A.J., Kerr, K., Mohay, G.M. (eds.) AusCERT Asia Pacific Information Technology Security Conference: Refereed R&D Stream, 22–26 May 2005, Gold Coast, Australia (2005)
– reference: Von SolmsRVan NiekerkJFrom information security to cyber securityComput. Secur.2013389710210.1016/j.cose.2013.04.004
– reference: RamakiAARasoolzadeganABafghiAGA systematic mapping study on intrusion alert analysis in intrusion detection systemsACM Comput. Surv. (CSUR)20185135510.1145/3184898
– reference: Ron, M.: Situational status of global cybersecurity and cyber defense according to global indicators. Adaptation of a model for ecuador. In: Developments and Advances in Defense and Security: Proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS 2018). Springer (2018)
– reference: Al MazariACyber terrorism taxonomies: definition, targets, patterns, risk factors, and mitigation strategiesCyber Security and Threats: Concepts, Methodologies, Tools, and Applications2018HersheyIGI Global60862110.4018/978-1-5225-5634-3.ch032
– reference: ChooK-KRThe cyber threat landscape: challenges and future research directionsComput. Secur.201130871973110.1016/j.cose.2011.08.004
– reference: HansenLNissenbaumHDigital disaster, cyber security, and the Copenhagen SchoolInt. Stud. Q.20095341155117510.1111/j.1468-2478.2009.00572.x
– reference: Kustarz, C.: et al.: System and method for denial of service attack mitigation using cloud services. Google Patents (2016)
– reference: NiaziMDo systematic literature reviews outperform informal literature reviews in the software engineering domain? An initial case studyArab. J. Sci. Eng.201540384585510.1007/s13369-015-1586-0
– reference: TahaAFRisk mitigation for dynamic state estimation against cyber attacks and unknown inputsIEEE Trans. Smart Grid20189288689910.1109/TSG.2016.2570546
– reference: von SolmsBvon SolmsRCybersecurity and information security—what goes where?Inf. Comput. Secur.20182612910.1108/ICS-04-2017-0025
– reference: Mittal, S.; et al.: Cybertwitter: using twitter to generate alerts for cybersecurity threats and vulnerabilities. In: Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. IEEE Press (2016)
– reference: RidTBuchananBAttributing cyber attacksJ. Strateg. Stud.2015381–243710.1080/01402390.2014.977382
– reference: Bada, M.; Sasse, A.M.; Nurse, J.R.: Cyber security awareness campaigns: why do they fail to change behaviour? arXiv:1901.02672 (2019)
– reference: Choraś, M.; et al.: Correlation approach for SQL injection attacks detection. In: International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions. Springer (2013)
– reference: Floyd, D.H.; Shelton, J.W.; Bush, J.E.: Systems and methods for detecting a security breach in an aircraft network. Google Patents (2018)
– reference: PetersenKVakkalankaSKuzniarzLGuidelines for conducting systematic mapping studies in software engineering: an updateInf. Softw. Technol.20156411810.1016/j.infsof.2015.03.007
– reference: AbomharaMKøienGMCyber security and the internet of things: vulnerabilities, threats, intruders and attacksJ. Cyber Secur.201541658810.13052/jcsm2245-1439.414
– reference: BrarHSKumarGCybercrimes: a proposed taxonomy and challengesJ. Comput. Netw. Commun.20182018
– reference: KuehlDTFrom cyberspace to cyberpower: Defining the problemCyberpower and National Security2009Washington, D.CNational Defense University Press
– volume: 83
  start-page: 116
  year: 2017
  ident: 4319_CR33
  publication-title: Inf. Softw. Technol.
  doi: 10.1016/j.infsof.2016.11.004
– ident: 4319_CR6
– ident: 4319_CR32
  doi: 10.1109/ICSE.2009.5070521
– ident: 4319_CR45
  doi: 10.14236/ewic/EASE2010.4
– ident: 4319_CR30
– volume: 40
  start-page: 845
  issue: 3
  year: 2015
  ident: 4319_CR47
  publication-title: Arab. J. Sci. Eng.
  doi: 10.1007/s13369-015-1586-0
– volume: 21
  start-page: 5
  issue: 1
  year: 2011
  ident: 4319_CR36
  publication-title: Res. Soc. Work Pract.
  doi: 10.1177/1049731509351988
– volume: 144
  start-page: 216
  year: 2018
  ident: 4319_CR39
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2018.07.028
– volume: 3
  start-page: 343
  issue: 4
  year: 2012
  ident: 4319_CR27
  publication-title: Int. J. Syst. Assur. Eng. Manag.
  doi: 10.1007/s13198-012-0125-6
– volume: 30
  start-page: 719
  issue: 8
  year: 2011
  ident: 4319_CR24
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2011.08.004
– volume-title: Hacking Cyberspace
  year: 2018
  ident: 4319_CR15
  doi: 10.4324/9780429500084
– ident: 4319_CR2
  doi: 10.1109/ISADS.2013.6513420
– volume-title: Cyberpower and National Security
  year: 2009
  ident: 4319_CR13
– ident: 4319_CR28
  doi: 10.1007/978-3-642-33018-6_18
– volume: 2012
  start-page: 8
  issue: 1
  year: 2012
  ident: 4319_CR25
  publication-title: Comput. Fraud Secur.
  doi: 10.1016/S1361-3723(12)70007-6
– ident: 4319_CR48
– volume: 50
  start-page: 107
  year: 2017
  ident: 4319_CR50
  publication-title: Comput. Stand. Interfaces
  doi: 10.1016/j.csi.2016.10.001
– ident: 4319_CR23
– volume: 51
  start-page: 55
  issue: 3
  year: 2018
  ident: 4319_CR40
  publication-title: ACM Comput. Surv. (CSUR)
  doi: 10.1145/3184898
– volume: 46
  start-page: 18
  year: 2014
  ident: 4319_CR43
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2014.06.008
– ident: 4319_CR44
  doi: 10.1145/1134285.1134500
– start-page: 266
  volume-title: Psychological and Behavioral Examinations in Cyber Security
  year: 2018
  ident: 4319_CR4
  doi: 10.4018/978-1-5225-4053-3.ch016
– volume: 53
  start-page: 1155
  issue: 4
  year: 2009
  ident: 4319_CR12
  publication-title: Int. Stud. Q.
  doi: 10.1111/j.1468-2478.2009.00572.x
– start-page: 608
  volume-title: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications
  year: 2018
  ident: 4319_CR11
  doi: 10.4018/978-1-5225-5634-3.ch032
– volume: 4
  start-page: 65
  issue: 1
  year: 2015
  ident: 4319_CR16
  publication-title: J. Cyber Secur.
  doi: 10.13052/jcsm2245-1439.414
– volume: 76
  start-page: 251
  issue: 3
  year: 2005
  ident: 4319_CR49
  publication-title: J. Syst. Softw.
  doi: 10.1016/j.jss.2004.06.004
– start-page: 259
  volume-title: The Oxford Handbook of International Political Theory
  year: 2018
  ident: 4319_CR8
– ident: 4319_CR31
  doi: 10.1145/1368088.1368112
– ident: 4319_CR41
  doi: 10.1007/978-3-319-70290-2_7
– volume: 26
  start-page: 2
  issue: 1
  year: 2018
  ident: 4319_CR9
  publication-title: Inf. Comput. Secur.
  doi: 10.1108/ICS-04-2017-0025
– volume: 64
  start-page: 1
  year: 2015
  ident: 4319_CR46
  publication-title: Inf. Softw. Technol.
  doi: 10.1016/j.infsof.2015.03.007
– volume: 58
  start-page: 170
  year: 2015
  ident: 4319_CR34
  publication-title: Inf. Softw. Technol.
  doi: 10.1016/j.infsof.2014.07.010
– volume: 800
  start-page: 150
  year: 2016
  ident: 4319_CR18
  publication-title: NIST Spec. Publ.
– volume: 26
  start-page: 73
  issue: 1
  year: 2007
  ident: 4319_CR26
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2006.10.009
– ident: 4319_CR22
– volume: 38
  start-page: 4
  issue: 1–2
  year: 2015
  ident: 4319_CR19
  publication-title: J. Strateg. Stud.
  doi: 10.1080/01402390.2014.977382
– volume: 100
  start-page: 212
  year: 2018
  ident: 4319_CR42
  publication-title: Comput. Ind.
  doi: 10.1016/j.compind.2018.04.017
– volume: 44
  start-page: 606
  issue: 4
  year: 2015
  ident: 4319_CR38
  publication-title: Kybernetes
  doi: 10.1108/K-12-2014-0283
– volume: 66
  start-page: 513
  year: 2016
  ident: 4319_CR20
  publication-title: Emory L. J.
– volume: 6
  start-page: 28611
  year: 2018
  ident: 4319_CR51
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2840322
– ident: 4319_CR1
– ident: 4319_CR17
  doi: 10.1109/ASONAM.2016.7752338
– volume-title: Cyberspace: First Steps
  year: 1991
  ident: 4319_CR14
– volume: 38
  start-page: 97
  year: 2013
  ident: 4319_CR3
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2013.04.004
– ident: 4319_CR5
– volume: 107
  start-page: 158
  year: 2015
  ident: 4319_CR37
  publication-title: J. Syst. Softw.
  doi: 10.1016/j.jss.2015.06.005
– volume: 9
  start-page: 886
  issue: 2
  year: 2018
  ident: 4319_CR7
  publication-title: IEEE Trans. Smart Grid
  doi: 10.1109/TSG.2016.2570546
– ident: 4319_CR10
– volume: 2018
  year: 2018
  ident: 4319_CR29
  publication-title: J. Comput. Netw. Commun.
– ident: 4319_CR35
  doi: 10.1145/2897053.2897069
– volume: 60
  start-page: 3023
  issue: 11
  year: 2015
  ident: 4319_CR21
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2015.2409905
SSID ssib048395113
ssj0001916267
ssj0061873
Score 2.4887614
Snippet There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 3171
SubjectTerms Cybersecurity
Empirical analysis
Engineering
Humanities and Social Sciences
Malware
Mapping
multidisciplinary
Phishing
Research Article - Computer Engineering and Computer Science
Science
Title Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
URI https://link.springer.com/article/10.1007/s13369-019-04319-2
https://www.proquest.com/docview/2386945004
Volume 45
WOSCitedRecordID wos000524444000051&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: Springer Journals New Starts & Take-Overs Collection
  customDbUrl:
  eissn: 2191-4281
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001916267
  issn: 2193-567X
  databaseCode: RSV
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA8yPejBb3E6JQdvGmjaJG28jeHwoEPYHLuVpE1VGJ2sm7D_3rysXVVU0HPTkLx8vPfLe-_3ELrQkYkUVyGhymeEhUoSxakiXBkmfC8TLHVVS-7CXi8ajeRDmRRWVNHulUvS3dR1slsQCIjtgcd8SL2xF-86BwokwOj9YbWLmFX51ooI6pcWawH5rpSsPZ0B4SIcldkz33f7WUPVZucXT6lTQN2d_w19F22XBiduL3fIHloz-T7a-kBDeIC6nYU2U9wvS9nhwTNYkgVWeYqH8zHwUrsQWguqr3Eb91fkz_heAb3DE4ZoxMUheuzeDDq3pKyvQBI7iBnxU2M0p4m0KDikylMmMUB_Ixi3CysAOlv0QbUWUlGLywIpTJqFmQq4zqyqD45QI5_k5hhhRr3MpJ7mUoGDmGrnHjRRYiS4Cr0mopVM46QkH4caGOO4pk0GGcVWRrGTUew30eXqn9cl9cavrVvVUsXlMSxiO0ghGbczaaKramnqzz_3dvK35qdo0wcc7iJ6Wqgxm87NGdpI3mYvxfTcbc93PGzaAw
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwEA8yBfXBb3E6NQ--aaBpk7TxbQzHxG0Im2NvIWlTFUaVfQj7702ydlVRQZ-bhuTycffL3f0OgAsV6UhSGSIsfYJIKDmSFEtEpSbM91JGEle1pB12u9FwyO_zpLBJEe1euCTdTV0muwUBs7E99jHfpt6Yi3eVWKJti9F7g2IXEaPyjRURlC8txgLyXSlZczoDRFk4zLNnvu_2s4Yqzc4vnlKngJrb_xv6DtjKDU5YX-yQXbCisz2w-YGGcB80G3Olx7CXl7KD_SdrSU6gzBI4mI0sL7ULoTWg-hrWYW9J_gw70tI7PEIbjTg_AA_Nm36jhfL6Cig2g5giP9FaURxzg4JDLD2pY23pbxihZmGZhc4GfWClGJfY4LKAM52kYSoDqlKj6oNDUMleMn0EIMFeqhNPUS6tgxgr5x7UUay5dRV6VYALmYo4Jx-3NTBGoqRNtjISRkbCyUj4VXC5_Od1Qb3xa-tasVQiP4YTYQbJOKFmJlVwVSxN-fnn3o7_1vwcrLf6nbZo33bvTsCGbzG5i-6pgcp0PNOnYC1-mz5Pxmduq74DfXXc5w
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3fS8MwEA6iIvrgb3E6NQ--aVnTJmnr25gWxTmGm2NvJW1TFUYdWyfsv_eStesUFcTnpiG5uzT39e6-Q-g8dKUrmHAMIixqUEd4hmBEGExIyi0z4TTWXUuaTqvl9vtee6GKX2e7FyHJWU2DYmlKs9owTmpl4Zttc5Xno37sqzIc-AivUEAyysYfO73Coihc_-BR2OVfF_CGLN1WFk6qbTDu9PNKmu-n_XxblS7ol6ipvoz8rf9vYxtt5o4ors8sZwctyXQXbSzQE-4hvzEN5Qh38hZ3uPuiPMwxFmmMe5OB4qvWqbUAtq9wHXfmpND4QSjah2esshSn--jJv-k2bo2874IRwSIyw4qlDBmJPEDHDhGmkJFUtDicMlA4V5AaUAkJQ-4JAnjN9riMEycRNgsTcAHsA7ScvqXyEGHQSSJjM2SeUIFjEuqwoXQj6akQollBpJBvEOWk5Ko3xiAo6ZSVjAKQUaBlFFgVdDF_Zzij5Ph1dLVQW5Afz3EAi-QeZbCTCros1FQ-_nm2o78NP0Nr7Ws_aN617o_RuqWguk76qaLlbDSRJ2g1es9ex6NTbbUf7FHlyw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+Security+Threats+and+Vulnerabilities%3A+A+Systematic+Mapping+Study&rft.jtitle=Arabian+journal+for+science+and+engineering+%282011%29&rft.au=Humayun%2C+Mamoona&rft.au=Niazi%2C+Mahmood&rft.au=Jhanjhi%2C+NZ&rft.au=Alshayeb%2C+Mohammad&rft.date=2020-04-01&rft.pub=Springer+Berlin+Heidelberg&rft.issn=2193-567X&rft.eissn=2191-4281&rft.volume=45&rft.issue=4&rft.spage=3171&rft.epage=3189&rft_id=info:doi/10.1007%2Fs13369-019-04319-2&rft.externalDocID=10_1007_s13369_019_04319_2
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2193-567X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2193-567X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2193-567X&client=summon