The role of national cybersecurity strategies on the improvement of cybersecurity education
Digital information and telecommunication technologies have not only become essential to
individuals' daily lives but also to a nation's sustained economic growth, societal well-being …
individuals' daily lives but also to a nation's sustained economic growth, societal well-being …
[HTML][HTML] Cyber security training for critical infrastructure protection: A literature review
Introduction: Today, cyber-security curricula are available across educational types and
levels, including a vast array of programs and modules tailored to specific sectors of industry …
levels, including a vast array of programs and modules tailored to specific sectors of industry …
A survey on security challenges in cloud computing: issues, threats, and solutions
Cloud computing has gained huge attention over the past decades because of continuously
increasing demands. There are several advantages to organizations moving toward cloud …
increasing demands. There are several advantages to organizations moving toward cloud …
Cyber security threats detection in internet of things using deep learning approach
The IoT (Internet of Things) connect systems, applications, data storage, and services that
may be a new gateway for cyber-attacks as they continuously offer services in the …
may be a new gateway for cyber-attacks as they continuously offer services in the …
RETRACTED ARTICLE: An adaptive traffic routing approach toward load balancing and congestion control in Cloud–MANET ad hoc networks
S Dalal, B Seth, V Jaglan, M Malik, Surbhi, N Dahiya… - Soft Computing, 2022 - Springer
It would not be an overstatement to say that Cloud services have exponentially increased
the computing power of mobile devices, enabling operators to undertake complex …
the computing power of mobile devices, enabling operators to undertake complex …
A customer-centric view of E-commerce security and privacy
S Saeed - Applied Sciences, 2023 - mdpi.com
Business organizations have huge potential to increase their customer base by offering e-
commerce services, especially in the post-pandemic era. Ensuring secure e-commerce …
commerce services, especially in the post-pandemic era. Ensuring secure e-commerce …
Internet of Things: Evolution and technologies from a security perspective
In recent years, IoT has developed into many areas of life including smart homes, smart
cities, agriculture, offices, and workplaces. Everyday physical items such as lights, locks and …
cities, agriculture, offices, and workplaces. Everyday physical items such as lights, locks and …
Attacking the trust machine: Develo** an information systems research agenda for blockchain cybersecurity
Blockchain-based systems become increasingly attractive targets for cybercrime due to the
rising amount of value transacted in respective systems. However, a comprehensive …
rising amount of value transacted in respective systems. However, a comprehensive …
Develo** a cyber security culture: Current practices and future needs
While the creation of a strong security culture has been researched and discussed for
decades, it continues to elude many businesses. Part of the challenge faced is distilling …
decades, it continues to elude many businesses. Part of the challenge faced is distilling …
Cloud security threats and solutions: A survey
Cloud computing is the on-demand availability of PC framework resources. Especially
information storage and handling power, without direct unique administration by the …
information storage and handling power, without direct unique administration by the …