U Inayat, M Farzan, S Mahmood, MF Zia… - Ain Shams Engineering …, 2024 - Elsevier
The increasing prevalence of cybercrime necessitates the implementation of robust security measures. The majority of these attacks are initiated by authorized users who possess …
A Rehman Javed, Z Jalil… - Transactions on …, 2022 - Wiley Online Library
The key characteristic of smart cities (ie, connectivity and intelligence) has enabled connected vehicles to work together to accomplish complex jobs that they are unable to …
Purpose This study aims to examine psychological mechanisms underlying tacit knowledge- sharing behaviours. The personality trait of conscientiousness is tested in relation to …
Abstract Situational Crime Prevention (SCP) is a criminological approach that is shown to reduce crime opportunities drawing from five different strategies comprising 25 techniques …
Reducing risky behaviors and traffic violations is crucial for preventing road trauma among private and commercial motorcyclists. While legal interventions such as road rules and …
The advancement of information communication technology in healthcare institutions has increased information security breaches. Scholars and industry practitioners have reported …
Ensuring employees' compliance with information security controls is a major challenge experienced by the management of information security in organisations. While the …
Cyber and information security (CIS) is an issue of national and international interest. Despite sophisticated security systems and extensive physical countermeasures to combat …
Abstract Hidden Markov Models have been extensively used for determining computer systems under a Multi-Stage Network Attack (MSA), however, acquisition of optimal model …