<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462023000200459</article-id>
<article-id pub-id-type="doi">10.13053/cys-27-2-3894</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Cyber Hygiene in Smart Metering Systems]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Olivares-Rojas]]></surname>
<given-names><![CDATA[Juan C.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Reyes-Archundia]]></surname>
<given-names><![CDATA[Enrique]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Gutiérrez-Gnecchi]]></surname>
<given-names><![CDATA[José A.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Molina-Moreno]]></surname>
<given-names><![CDATA[Ismael]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Méndez-Patiño]]></surname>
<given-names><![CDATA[Arturo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cerda-Jacobo]]></surname>
<given-names><![CDATA[Jaime]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Tecnológico Nacional de México  ]]></institution>
<addr-line><![CDATA[Morelia ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Michoacana de San Nicolás de Hidalgo Facultad de Ingeniería Eléctrica ]]></institution>
<addr-line><![CDATA[Morelia ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2023</year>
</pub-date>
<volume>27</volume>
<numero>2</numero>
<fpage>459</fpage>
<lpage>475</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462023000200459&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462023000200459&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462023000200459&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: One of the fundamental components of smart cities is the smart grid characterized by various information and operational technologies that guarantee reliable and clean energy supply. For this reason, they are a fundamental pillar for achieving sustainability in the world in which we live. Despite the enormous advantages of the smart grid, it has quite a few challenges; one that has been fundamental in recent years is cybersecurity. The traditional approach to address cybersecurity issues generally does not consider the human factor as the main component. Recently, the concept of cyber hygiene has emerged, where the social and human aspect is fundamental since in the same similarity with traditional hygiene, the fact of carrying out personal care practices can contribute to improving people&#8217;s health, in this sense, having better personal cybersecurity practices will allow for better cybersecurity performance of systems. This work shows the implementation of cyber hygiene in the context of smart grid, showing a methodology to carry it out and applying it in the context of smart metering systems. The results show that the proposed method can successfully be used in the smart grid and can be applied to other contexts.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Cybersecurity]]></kwd>
<kwd lng="en"><![CDATA[cyber hygiene]]></kwd>
<kwd lng="en"><![CDATA[internet of things]]></kwd>
<kwd lng="en"><![CDATA[smart grid]]></kwd>
<kwd lng="en"><![CDATA[smart meters]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vishwanath]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Neo]]></surname>
<given-names><![CDATA[L. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Goh]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Khader]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ong]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Chin]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber hygiene: The concept, its measure, and its initial tests]]></article-title>
<source><![CDATA[Decision Support Systems]]></source>
<year>2020</year>
<volume>128</volume>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nathali]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Towards sustainable smart cities: A review of trends, architectures, components, and open challenges in smart cities]]></article-title>
<source><![CDATA[Sustainable Cities and Society]]></source>
<year>2018</year>
<volume>38</volume>
<page-range>697-713</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leszczyna]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A review of standards with cybersecurity requirements for smart grid]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2018</year>
<volume>77</volume>
<page-range>262-76</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Braun]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Fung]]></surname>
<given-names><![CDATA[B. C. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Iqbal]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Shah]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security and privacy challenges in smart cities]]></article-title>
<source><![CDATA[Sustainable Cities and Society]]></source>
<year>2018</year>
<volume>39</volume>
<page-range>499-507</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marah]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Hibaoui]]></surname>
<given-names><![CDATA[A. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Algorithms for smart grid management]]></article-title>
<source><![CDATA[Sustainable Cities and Society]]></source>
<year>2018</year>
<volume>38</volume>
<page-range>627-35</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dileep]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on smart grid technologies and applications]]></article-title>
<source><![CDATA[Renewable Energy]]></source>
<year>2020</year>
<volume>146</volume>
<page-range>2589-625</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Van-Aubel]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Poll]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Smart metering in the Netherlands: What, how, and why]]></article-title>
<source><![CDATA[International Journal of Electrical Power &amp; Energy Systems]]></source>
<year>2019</year>
<volume>109</volume>
<page-range>719-25</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="">
<collab>Department of Energy &amp; Climate Change</collab>
<source><![CDATA[Smart metering implementation programme: Progress report 2018]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Modeste]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Current standards for cyber-hygiene in industrial control system environments]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Rieger]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ray]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Haney]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Industrial Control Systems Security and Resiliency, Advances in Information Security]]></source>
<year>2019</year>
<volume>75</volume>
<publisher-loc><![CDATA[Cham ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cain]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Edwards]]></surname>
<given-names><![CDATA[M. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Still]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An exploratory study of cyber hygiene behaviors and knowledge]]></article-title>
<source><![CDATA[Journal of Information Security and Applications]]></source>
<year>2018</year>
<volume>42</volume>
<page-range>36-45</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Parikh]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Dave]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Patel]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Doshi]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security and privacy issues in cloud, fog and edge computing]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2019</year>
<volume>160</volume>
<page-range>734-9</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Laufs]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Borrion]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Bradford]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security and the smart city: A systematic review]]></article-title>
<source><![CDATA[Sustainable Cities and Society]]></source>
<year>2020</year>
<volume>55</volume>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ande]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Adebisi]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Hammoudeh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Saleem]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Internet of things: evolution and technologies from a security perspective]]></article-title>
<source><![CDATA[Sustainable Cities and Society]]></source>
<year>2020</year>
<volume>54</volume>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Habibzadeh]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Nussbaum]]></surname>
<given-names><![CDATA[B. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Anjomshoa]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Kantarci]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Soyata]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities]]></article-title>
<source><![CDATA[Sustainable Cities and Society]]></source>
<year>2019</year>
<volume>50</volume>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gunduz]]></surname>
<given-names><![CDATA[M. Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Das]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-security on smart grid: Threats and potential solutions]]></article-title>
<source><![CDATA[Computer Networks]]></source>
<year>2020</year>
<volume>169</volume>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ferrag]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Maglaras]]></surname>
<given-names><![CDATA[L. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Janicke]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Jiang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Shu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A systematic review of data protection and privacy preservation schemes for smart grid communications]]></article-title>
<source><![CDATA[Sustainable Cities and Society]]></source>
<year>2018</year>
<volume>38</volume>
<page-range>806-35</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abujubbeh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Turjman]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Fahrioglu]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Software-defined wireless sensor networks in smart grids: An overview]]></article-title>
<source><![CDATA[Sustainable Cities and Society]]></source>
<year>2019</year>
<volume>51</volume>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ratchford]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[BYOD: A security policy evaluation model]]></article-title>
<source><![CDATA[Advances in Intelligent Systems and Computing]]></source>
<year>2018</year>
<volume>558</volume>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Such]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ciholas]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Rashid]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Vidler]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Seabrook]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Basic cyber hygiene: does it work?]]></article-title>
<source><![CDATA[Computer]]></source>
<year>2019</year>
<volume>52</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>21-31</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Facetti]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Staying clean: cyber hygine &amp; social engineering with scada &amp; industrial control systems]]></source>
<year>2018</year>
<publisher-name><![CDATA[San Diego State University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leszczyna]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Wróbel]]></surname>
<given-names><![CDATA[M. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Threat intelligence platform for the energy sector]]></article-title>
<source><![CDATA[Software: Practice &amp; Experience]]></source>
<year>2019</year>
<volume>49</volume>
<page-range>1225-54</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="">
<collab>European Union Agency for Cybersecurity ENISA</collab>
<source><![CDATA[Review of cyber hygiene practices]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Oravec]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Emerging cyber hygiene practices for the Internet of Things (IoT): Professional issues in consulting clients and educating users on IoT privacy and security]]></source>
<year>2017</year>
<conf-name><![CDATA[ IEEE International Professional Communication Conference (ProComm)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Neigel]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Claypoole]]></surname>
<given-names><![CDATA[V. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Waldfogle]]></surname>
<given-names><![CDATA[G. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Acharya]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hancock]]></surname>
<given-names><![CDATA[G. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Holistic cyber hygiene education: Accounting for the human factors]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2020</year>
<volume>92</volume>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yamin]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Katt]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Gkioulos]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber ranges and security testbeds: Scenarios, functions, tools and architecture]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2020</year>
<volume>88</volume>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kallberg]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The common criteria meets realpolitik: Trust, alliances, and potential betrayal]]></article-title>
<source><![CDATA[IEEE Security &amp; Privacy]]></source>
<year>2012</year>
<volume>10</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>50-3</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ibrahim]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Valli]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[McAteer]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Chaudhry]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A security review of local government using NIST CSF: A case study]]></article-title>
<source><![CDATA[Journal of Supercomputing]]></source>
<year>2018</year>
<volume>74</volume>
<page-range>5171-86</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khou]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mailloux]]></surname>
<given-names><![CDATA[L. O.]]></given-names>
</name>
<name>
<surname><![CDATA[Pecarina]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mcevilley]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A customizable framework for prioritizing systems security engineering processes, activities, and tasks]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2017</year>
<volume>5</volume>
<page-range>12878-94</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mirtsch]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kinne]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Blind]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Exploring the adoption of the international information security management system standard ISO/IEC 27001: A Web Mining-Based Analysis]]></article-title>
<source><![CDATA[IEEE Transactions on Engineering Management]]></source>
<year>2020</year>
<volume>68</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>27-100</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Amorim]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mira da Silva]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Pereira]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Gonçalves]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Using agile methodologies for adopting COBIT]]></article-title>
<source><![CDATA[Information Systems]]></source>
<year>2020</year>
<volume>101</volume>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Orta]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Ruiz]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Met4ITIL: A process management and simulation-based method for implementing ITIL]]></article-title>
<source><![CDATA[Computer Standards &amp; Interfaces]]></source>
<year>2019</year>
<volume>61</volume>
<page-range>1-19</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="">
<collab>Mexico National Intelligence Center</collab>
<source><![CDATA[Administrative manual of general application in the áreas of information communication and information technologies, and in the information security (MAAGTICSI)]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alsmadi]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[The NICE cyber security framework]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Anwar]]></surname>
<given-names><![CDATA[M. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Nazir]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ansari]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modeling security threats for smart cities: A STRIDE-based approach]]></article-title>
<source><![CDATA[Lecture Notes in Civil Engineering]]></source>
<year>2020</year>
<volume>58</volume>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naagas]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Palaoag]]></surname>
<given-names><![CDATA[T. D.]]></given-names>
</name>
</person-group>
<source><![CDATA[A threat-driven approach to modeling a campus network security]]></source>
<year>2018</year>
<conf-name><![CDATA[ 6th International Conference on Communications and Broadband Networking (ICCBN]]></conf-name>
<conf-date>2018</conf-date>
<conf-loc>New York, NY, USA </conf-loc>
<page-range>6-12</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pattanavichai]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Comparison for network security scanner tools between GFI LanGuard and Microsoft Baseline Security Analyzer (MBSA)]]></source>
<year>2017</year>
<conf-name><![CDATA[ 15th International Conference on ICT and Knowledge Engineering (ICT&amp;KE)]]></conf-name>
<conf-loc>Bangkok </conf-loc>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kritikos]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Magoutis]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Papoutsakis]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ioannidis]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on vulnerability assessment tools and databases for cloud- based web applications]]></article-title>
<source><![CDATA[Array]]></source>
<year>2019</year>
<numero>3&#8211;4</numero>
<issue>3&#8211;4</issue>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tao]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Yuqing]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Bo]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Jing]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Yunxiang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Jing]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel improved system based on CVSS]]></article-title>
<source><![CDATA[Lecture Notes in Electrical Engineering]]></source>
<year>2020</year>
<volume>517</volume>
<page-range>1015-21</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Johnson]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk Management Framework]]></article-title>
<source><![CDATA[Security controls evaluation, testing, and assessment handbook]]></source>
<year>2020</year>
<edition>Second</edition>
<page-range>31-41</page-range><publisher-name><![CDATA[Academic Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brunner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wolfartsberger]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Virtual reality enriched business model canvas building blocks for enhancing customer retention]]></article-title>
<source><![CDATA[Procedia Manufacturing]]></source>
<year>2020</year>
<volume>42</volume>
<page-range>154-7</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Panda]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Panaousis]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Loukas]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Laoudias]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Optimizing investments in cyber hygiene for protecting healthcare users]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Di Pierro]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Malacaria]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Nagarajan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[From Lambda Calculus to Cybersecurity Through Program Analysis, Lecture Notes in Computer Science]]></source>
<year>2020</year>
<volume>12065</volume>
<page-range>268-91</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maennel]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Mäses]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Maennel]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber hygiene: The big picture]]></article-title>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>2018</year>
<volume>11252</volume>
<page-range>291-305</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shrestha]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Johansen]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Noll]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Roverso]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Methodology for security classification applied to smart grid infrastructures]]></article-title>
<source><![CDATA[International Journal of Critical Infrastructure Protection]]></source>
<year>2020</year>
<volume>28</volume>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
