Fog-computing-based cyber–physical system for secure food traceability through the Twofish algorithm

KA Awan, IU Din, A Almogren, BS Kim - Electronics, 2022 - mdpi.com
The Internet is an essential part of daily life with the expansion of businesses for maximizing
profits. This technology has intensely altered the traditional shopping style in online …

Deep Learning-based Framework for Detecting Malicious Insider-Inspired Cyberattacks Activities in Organisations

G Chengetanai, TR Chandigere… - International …, 2024 - papers.academic-conferences.org
Cyberattacks are happening at an alarming rate both in developed and developing
countries. This is due to more users now being connected to the global village (internet) …

Preventing the Insider Threat on Information Loss Among Partner Communities: A Qualitative Exploratory Study

OC Henderson - 2023 - search.proquest.com
Research efforts explored the data security protection improvements cybersecurity
managers need regarding the insider threats which cause data loss across multiple …