Author:Phahlamohlaka, Letlibe J; Théron, J; Aschmann, MJDate:2022Cybersecurity has evolved over the years, and today cyberattacks instigated by cyber-criminals, nation states, or insider threat actors are part of regular headline news. In South Africa and around the world, the number of cyberattacks or ...Read more
Author:Badenhorst, Danielle PDate:06 Sep 2023Reliance on digital technologies for innovation management is unavoidable in current contexts. While digital processes and business models have been prioritised as key factors to drive innovation and value creation within firms, cybersecurity ...Read more
Author:Dawood, Zubeida C; Van 't Wout, CDate:Oct 2022Although there is an increasing amount of information for counter-terrorism operations freely available online, it is a complex process to extract relevant information and to detect useful patterns in the data in order for intelligence ...Read more
Author:Cebekhulu, Eric; Onumanyi, Adeiza J; Isaac, Sherrin JDate:Feb 2022The use of machine learning (ML) algorithms for power demand and supply prediction is becoming increasingly popular in smart grid systems. Due to the fact that there exist many simple ML algorithms/models in the literature, the question arises ...Read more
Author:Nelufule, Nthatheni; Singano, Zothile T; Shadung, Lesiba D; Masemola, Kelebogile BDate:Jun 2023The Internet of Things has enabled unprecedented levels of devices connectivity and communication through data collection and sharing from multiple devices. These massive communications also introduced new challenges to digital forensics, ...Read more
Author:Gertenbach, Wian P; Botha, Johannes G; Leenen, LDate:Mar 2024The characteristics of blockchain established a desirable platform for entities to innovate and operate in a secure, transparent, and decentralised manner. However, cybercriminals have increasingly found refuge in the decentralised environment ...Read more
Author:Mwim, EM; Mtsweni, Jabu S; Mwim, OSDate:Aug 2022The evolution in digital technologies and the Internet, in particular, has had a profound effect on the way healthcare institutions operate, assist patients, and manage personal healthcare data. In the same vein, various healthcare systems, ...Read more
Author:Mthethwa, Sthembile NDate:Aug 2023The tremendous growth of the Internet of Things (IoT) connected devices calls for a way for manufacturers to standardise the newly created devices for security purposes. As these devices are getting smaller and smaller so does the computational ...Read more
Author:Mtsweni, Jabu SDate:Nov 2023Cybersecurity attacks are classified in the top 10 global risks by the World Economic Forum in 2023. The common cyber-incidents that affect businesses, governments, and individuals across the globe are data breaches. Recent reports indicate ...Read more
Author:Mwim, EN; Mtsweni, Jabu SDate:Jul 2022There is a need to shift from a purely technological approach in addressing cybersecurity threats to a more human inclusive method. As a result, cybersecurity culture is gaining momentum in research as an approach in addressing cybersecurity ...Read more
Author:Mtsweni, Jabu SDate:Oct 2023Cyber-attacks continue to evolve, circumventing modern security solutions and exploiting discovered software vulnerabilities. Businesses and governments tend to respond in a reactive manner when dealing with these attacks, mostly due to limited ...Read more