As cyber threats evolve and grow progressively more sophisticated, cyber...
The term "digital twin" (DT) has become a key theme of the cyber-physica...
A wide variety of Cyber Threat Information (CTI) is used by Security
Ope...
Although sufficient authentication mechanisms were enhanced by the use o...
The Internet of Things (IoT) paradigm has displayed tremendous growth in...
The increased adoption of Artificial Intelligence (AI) presents an
oppor...
The majority of systems rely on user authentication on passwords, but
pa...
Existing cyber security solutions have been basically developed using
kn...
In Cyberspace nowadays, there is a burst of information that everyone ha...
The recent outbreak of COVID-19 has taken the world by surprise, forcing...
The NIS Directive introduces obligations for the security of the network...
As Critical National Infrastructures are becoming more vulnerable to cyb...
The United Nations conducts peace operations around the world, aiming
to...
This paper proposes a novel intrusion detection system (IDS) that combin...
This paper presents a comprehensive survey of the existing blockchain
pr...
Cyber peacekeeping is an emerging and multi-disciplinary field of resear...
This paper presents a comprehensive investigation of authentication sche...
The synergy between the cloud and the IoT has emerged largely due to the...
Peacekeeping is a noble and essential activity, helping to bring peace t...