Articles
A Review of Routing Attacks in Routing Protocol Over Low-Power and Lossy-based IoT Networks
Lanka Chris Sejaphala Mr., Vusimuzi Malele Prof, and Francis Lugayizi Prof.
Integrating Adversarial Scenarios into LLM Security Labs: An Experience Report on a Hands-On Approach
Dominic A. Wilson
Cyber Science Education Meets Healthcare Technology
Angela Spencer
Cybersecurity in Higher Education Institutions: Awareness, Policy, and Experience on Employee Behaviour
Abdullahi Abiodun Yusuf and Adriana A. Steyn
Simulating Cyber-Resilience: The Strategic Role of the Locked Shields Exercise in Enhancing International Cyber Preparedness
Christopher A. Ramezan, Ludwig Christian Schaupp, Elizabeth A. Vitullo, and William J. Walker
Enhancing Cyber Hygiene among Communities through Experiential Cyber-Security Awareness Programs
Dr Atul Bamrara, Partha Roy, Vishwanath Gargote, and Khandu Thungon
Adopting Artificial Intelligence: Cross-Sector Analysis of AI Adoption Risks
Brandon Saari, Yona Berger, Yanett Munoz, Alex Agnick, Paul Wagner, and Robert J. Honomichl
Innovations and Applications of Virtual Private Networks and Sustainable Security in Society 5.0 Libraries
Stella Chinnaya Nduka Dr., Adeyinka Tella Prof, and Petros Dlamini Dr