M. Evans, Y. He*, C. Luo, I. Yevseyeva, H.Janicke, E. Zamani and L. Maglaras. Real-time information security incident management: a case study using the IS-CHEC technique. IEEE Access. 2019. Submitted. (Impact Factor 4.098).
S. Nafea, Y. He*, F.Siewe. On Recommendation of Learning Objects using Felder Silverman Learning Style Model.IEEE Access. 2019. Accepted. (IF 4.09).
M. Evans, Y. He*, C. Luo, I. Yevseyeva, H.Janicke and L. Maglaras. Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form. IEEE Access. 2019. Accepted. (Impact Factor 4.098).
M. Evans, Y. He*, L. Maglaras and H.Janicke. Evaluating Information Security Core Human Error Causes (IS-CHEC) Technique in Public Sector and Comparison with the Private Sector. International Journal of Medical Informatics. 2019. (Impact Factor 3.210).
P. Loft, Y. He*, I. Wagner and H. Janicke. Dying of a hundred good symptoms: why good security fails. Enterprise Information Systems. 2019.
M. Vitunskaite, Y. He*, T. Brandstetter and H. Janicke. Smart Cities and Cyber Security: Are We There Yet? A Comparative Study on the Role of Standards, Third Party Risk Management and Security Ownership. Computers & Security. 2019. (Impact Factor 3.062).
E. Zamani, Y. He*, and M. Philips. Blockchain Security: Some Initial Recommendations. Journal of Computer Information Systems. 2018.
M. Evans, Y. He*, L. Maglaras, and H. Janicke. HEART-IS: A Novel Technique for Evaluating Human Error-Related Information Security Incidents. Computers & Security. 2018 (Impact Factor 3.062).
A. Al-Barnawi, Y. He*, L. Maglaras, and H. Janicke. Electronic Medical Records and Risk Management in Hospitals of Saudi Arabia. Informatics for Health and Social Care. 2018.
A. Wood, Y. He*, L. Maglaras and H. Janicke. Security Architectural Pattern for Risk Management of Industry Control Systems within Critical National Infrastructure. International Journal of Critical Infrastructures. 2018.
Y. He*, and C.W. Johnson. Challenges of Information Security Incident Learning: An Industrial Case Study in a Chinese Healthcare Organisation. Informatics for Health and Social Care. 2017.
M. Evans, L. Maglaras, Y. He*, and H.Janicke,. Human Behaviour as an Aspect of Cyber Security Assurance. Security and Communication Networks. 2016.
N. Ayres, L. Maglaras, H. Janicke, and Y. He*. The mimetic virus: A vector for cyber terrorism. International Journal of Business Continuity and Risk Management. 2016.
L. A. Maglaras, A. H. Al-Bayatti, Y. He, I. Wagner, and H. Janicke. Social Internet of Vehicles for Smart Cities. Journal of Sensor and Actuator Networks. 2016.
Y. He*, and C.W. Johnson. Improving the Redistribution of the Security Lessons in Healthcare: An Industrial Evaluation of the Generic Security Template. International Journal of Medical Informatics. 2015. (Impact Factor 3.210).
Y. He*, and C.W. Johnson. Improving the Exchange of Lessons Learned in Security Incident Reports: Case Studies in the Privacy of Electronic Patient Records. Journal of Trust Management. 2015.
L. Maglaras, Y. He*, H. Janicke, and M.A. Ferrag. “Internet of Cloud: Security and Privacy issues” in Cloud Computing for Optimization: Foundations, Applications, Challenges. Springer. 2017.
C. Luo, H. Soygazi, Y. He*. Security Defense Strategy for Intelligent Medical Diagnosis Systems (IMDS). 2019 41th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). 2019. accepted.
M. Evans, Y. He, I. Yevseyeva and H. Janicke. Analysis of published public sector information security incidents and breaches to establish the proportions of human error. International Symposium on Human Aspects of Information Security & Assurance (HAISA). 2018.
Aliyu, F. Chen, Y. He, and H. Yang. QoS-aware Adaptive Capacity Management for Real-time EdgeIoT Applications. The 2017 IEEE International Conference on Software Quality, Reliability & Security, 2017.
Aliyu, F. Chen, Y. He, and H. Yang. A Game-Theoretic Based QoS-aware Capacity Management for Real-time EdgeIoT Applications. The 2017 IEEE International Conference on Software Quality, Reliability & Security, 2017.
G. Hawthorne, Y. He, L. Maglaras, and H. Janicke. Security Visualization: Detecting Denial Of Service. 2nd EAI International Conference on Industrial Networks and Intelligent Systems (INISCOM 2016) Leicester, UK, Oct 31- Nov 2, 2016.
N. Tailor, Y. He and I. Wagner, Poster: Design Ideas for Privacy-aware User Interfaces for Mobile Devices, Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16), Darmstadt, Germany, July 2016.
I. Wagner, Y. He, D. Rosenberg and H. Janicke, User Interface Design for Privacy Awareness in eHealth Technologies, Proceedings of 13th IEEE Annual Consumer Communications & Networking Conference (CCNC 2016), Las Vegas, NV, January 2016, pp. 38-43.
Y. He, L.A. Maglaras, H. Janicke, and K. Jones. An industrial control systems incident response decision framework. In Communications and Network Security (CNS), 2015 IEEE Conference on 2015 Sep 28 (pp. 761-762). IEEE.
Y. He, and H. Janicke. Towards agile industrial control systems incident response. Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015 Sep 17 (pp. 95-98). British Computer Society.
Y. He, and C.W. Johnson, M. Evangelopoulou and Z.S. Lin. Diagraming Approach to Structure the Security Lessons: Evaluation using Cognitive Dimensions. The 7th International Conference on Trust & Trustworthy Computing, Crete, Greece, 2014.
Y. He, and C.W. Johnson. Improving the Exchange of Lessons Learned in Security Incident Reports: Case Studies in the Privacy of Electronic Patient Records. The 8th IFIP WG 11.11 International Conference on Trust Management, Singapore, 2014.
Y. He, and C.W. Johnson. Improving the Information Security Management: An Industrial Study in the Privacy of Electronic Patient Records. IEEE CBMS 2014 - The 27th International Symposium on Computer-Based Medical Systems, New York, the US, 2014.
Y. He, and C.W. Johnson, K. Renaud et al. An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents. The 6th International Conference of Computer Science and Information Technology, Amman, Jordan, 2014.
Y. He, and C.W. Johnson. Generic Security Cases for Information System Security in Healthcare Systems. 7th IET International Conference on System Safety, Incorporating the Cyber Security Conference, Edinburgh, UK, 2012.