@incollection{, 439BFC3481CC52CEBEF5488F54150D92 , author={{RabeaMasood} and {MehreenSirshar} and {QariaZainab} and {Fatima Jinnah Women University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}154710 } @book{b0, , title={{Cyber security: a national effort to improve}} , author={{ JohnMalgeri }} , year={September 2009} , publisher={IEEE} Kennesaw State University } @incollection{b1, , title={{Will cyber-insurance improve network security? A market analysis}} , author={{ RPal } and { LGolubchik } and { KPsounis } and { ; PanHui }} , booktitle={{INFOCOM, 2014 Proceedings IEEE}} , year={2014} } @book{b2, , title={{Cyber security operations center characterization model and analysis}} , author={{ SKowtha HST } and { LANolan HST } and { RADaley HST } and { Security HST }} , year={2012} , publisher={IEEE} } @book{b3, , title={{A security framework for protecting business, government and society from cyber-attacks}} , author={{ PR JTrim } and { Yang-ImLee }} , year={2010} , publisher={IEEE} } @book{b4, , title={{Protecting cyber critical infrastructure (CCI): integrating information security risk analysis and environmental vulnerability analysis}} , author={{ TFeglar } and { Comput } and { Sci } and { Consultant } and { JKLevy }} , year={2004} , publisher={IEEE} } @incollection{b5, , title={{Cyber security analysis of state estimators in electric power systems}} , author={{ ATeixeira } and { SAmin } and { HSandberg } and { KHJohansson } and { SSSastry }} , journal={{Atlanta G.A}} , year={December 2010} } @book{b6, , title={{}} , author={{ Pengxie } and { JasonHLi } and { Xinmingou }} } @book{b7, , title={{Using Bayesian networks for cyber security analysis}} , author={{ PengLiu } and { ;Levy } and { R }} , year={2010} , publisher={IEEE} } @book{b8, , title={{Continuous monitoring and cyber security for high performance computing}} , author={{ AlexMalin }} , publisher={ACM} } @book{b9, , title={{Towards Secure Information Sharing models for community Cyber Security}} , author={{ RSandhu } and { RKrishnan } and { GregoryBWhite }} , year={October 2010} , publisher={IEEE} } @book{b10, , title={{Towards a cyber-security aware rural community}} , author={{ ProfMarthie; Zama Dlamini; Siphongobeni }} , year={2011} , publisher={IEEE} } @book{b11, , title={{A Security Framework for Protecting Business, Government and Society from Cyber Attacks}} , author={{ Dr } and { R JPeter } and { Trim } and { Dr } and { -ImYang } and { Lee }} , year={2015} , publisher={IEEE} } @book{b12, , title={{From Information Security to Cyber Security Cultures Organizations to Societies}} , author={{ RayneReid ;Lohan Van Niekerk }} , year={2014} , publisher={IEEE} } @incollection{b13, , author={{ JanKallberg } and { ;Bhavanithuraisingham }} , booktitle={{Towards Cyber Operations, the New Role of Academic Cyber Security Research and Education}} , year={2012} } @book{b14, , title={{}} , author={{ RobertKAbercrombie }} } @book{b15, , title={{Validating Cyber Security Requirements: A Case Study}} , author={{ TFrederick } and { Sheldon; Ali Mili }} , year={2014} , publisher={IEEE} } @book{b16, , author={{ EllefsenIan }} , title={{The Development of a Cyber Security Policy in Developing Regions and the Impact on Stakeholders}} , publisher={IEEE} , year={2013} } @book{b17, , title={{}} , author={{ AnisBen } and { Aissa }} } @book{b18, , title={{}} , author={{ RobertKAbercrombie }} } @book{b19, , title={{Quantifying Security Threats and Their Impact}} , author={{ TFrederick } and { MilliSheldon ; Ali }} , year={2013} , publisher={IEEE} } @book{b20, , title={{Trust but Verify Critical Infrastructure Cyber Security Solutions}} , author={{ KDennis } and { Holstein; Keith } and { Stouffer }} , year={2010} , publisher={IEEE} } @book{b21, , author={{ SajjanShiva } and { ; SankardasRoy } and { ;Dipankardasgupta }} , title={{Game Theory for Cyber Security}} , publisher={IEEE} , year={2010} } @book{b22, , author={{ RebeccaLefebvre }} , title={{The Human Element in Cyber Security: A Study on Student Motivation to Act}} , publisher={IEEE} , year={2012} } @book{b23, , title={{A Pilot Study of Cyber Security and Privacy Related Behavior and Personality Traits}} , author={{ JamesTziporahalevi } and { Lewis;Nasirmemon }} , year={2013} , publisher={IEEE} }