M Van Haastrecht, G Golpur, G Tzismadia, R Kab… - Electronics, 2021 - mdpi.com
Small-and medium-sized enterprises (SMEs) frequently experience cyberattacks, but often do not have the means to counter these attacks. Therefore, cybersecurity researchers and …
M Mutemwa, J Mtsweni… - 2017 Conference on …, 2017 - ieeexplore.ieee.org
Cyberattacks are on the increase in severity, complexity and frequency, negatively affecting the citizens, government, and businesses. Adversely, the security and Defence role-players …
F Kolini, LJ Janczewski - … of the Association for Information Systems, 2022 - aisel.aisnet.org
Cybersecurity intelligence sharing (CIS) has gained significance as an organizational function to protect critical information assets, manage cybersecurity risks, and improve …
M Mutemwa, J Mtsweni, L Zimba - … International conference on …, 2018 - ieeexplore.ieee.org
A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring and incident response. SOCs are critical when determining an organization's cybersecurity …
A Berndt, J Ophoff - Information Security Education. Information Security in …, 2020 - Springer
Organizations can struggle to cope with the rapidly advancing threat landscape. A cyber threat intelligence (CTI) function broadly aims to understand how threats operate to better …
J Mtsweni, M Mutemwa, N Mkhonto - Journal of Information Warfare, 2016 - JSTOR
As data in cyberspace continues to grow because of the ubiquity of Information Communication Technologies (ICT), it is becoming challenging to obtain context-aware …
J Mtsweni, N Gcaza, M Thaba - Proceedings of the Annual Conference of …, 2018 - dl.acm.org
Information and Communication Technologies (ICTs) present a number of vulnerabilities, threats and risks that could lead to devastating cyber-attacks resulting into huge financial …
A Ronchi - International Journal of Information Security, 2018 - re.public.polimi.it
The present paper briefly introduces a general view on tomorrow's border control system and EU inter-BCP real time information sharing, exploring and proposing new operational …
J Mtsweni, M Mutemwa - Proceedings of the ECCWS 2019 18th …, 2019 - books.google.com
Extracting actionable threat intelligence from what is perceived to be relevant data sources in the cybersecurity environments still faces a number of unsolved challenges. The …