The role of national cybersecurity strategies on the improvement of cybersecurity education

S AlDaajeh, H Saleous, S Alrabaee, E Barka… - Computers & …, 2022 - Elsevier
Digital information and telecommunication technologies have not only become essential to
individuals' daily lives but also to a nation's sustained economic growth, societal well-being …

[HTML][HTML] Cyber security training for critical infrastructure protection: A literature review

N Chowdhury, V Gkioulos - Computer Science Review, 2021 - Elsevier
Introduction: Today, cyber-security curricula are available across educational types and
levels, including a vast array of programs and modules tailored to specific sectors of industry …

A survey on security challenges in cloud computing: issues, threats, and solutions

H Tabrizchi, M Kuchaki Rafsanjani - The journal of supercomputing, 2020 - Springer
Cloud computing has gained huge attention over the past decades because of continuously
increasing demands. There are several advantages to organizations moving toward cloud …

Cyber security threats detection in internet of things using deep learning approach

F Ullah, H Naeem, S Jabbar, S Khalid, MA Latif… - IEEE …, 2019 - ieeexplore.ieee.org
The IoT (Internet of Things) connect systems, applications, data storage, and services that
may be a new gateway for cyber-attacks as they continuously offer services in the …

RETRACTED ARTICLE: An adaptive traffic routing approach toward load balancing and congestion control in Cloud–MANET ad hoc networks

S Dalal, B Seth, V Jaglan, M Malik, Surbhi, N Dahiya… - Soft Computing, 2022 - Springer
It would not be an overstatement to say that Cloud services have exponentially increased
the computing power of mobile devices, enabling operators to undertake complex …

A customer-centric view of E-commerce security and privacy

S Saeed - Applied Sciences, 2023 - mdpi.com
Business organizations have huge potential to increase their customer base by offering e-
commerce services, especially in the post-pandemic era. Ensuring secure e-commerce …

Internet of Things: Evolution and technologies from a security perspective

R Ande, B Adebisi, M Hammoudeh, J Saleem - Sustainable Cities and …, 2020 - Elsevier
In recent years, IoT has developed into many areas of life including smart homes, smart
cities, agriculture, offices, and workplaces. Everyday physical items such as lights, locks and …

Attacking the trust machine: Develo** an information systems research agenda for blockchain cybersecurity

V Schlatt, T Guggenberger, J Schmid… - International journal of …, 2023 - Elsevier
Blockchain-based systems become increasingly attractive targets for cybercrime due to the
rising amount of value transacted in respective systems. However, a comprehensive …

Develo** a cyber security culture: Current practices and future needs

B Uchendu, JRC Nurse, M Bada, S Furnell - Computers & Security, 2021 - Elsevier
While the creation of a strong security culture has been researched and discussed for
decades, it continues to elude many businesses. Part of the challenge faced is distilling …

Cloud security threats and solutions: A survey

UA Butt, R Amin, M Mehmood, H Aldabbas… - Wireless Personal …, 2023 - Springer
Cloud computing is the on-demand availability of PC framework resources. Especially
information storage and handling power, without direct unique administration by the …