Top Crypto Scams in 2022-2024: Analysing Trends, Tactics, and Regulatory Responses Johannes George Botha, CSIR, South Africa
Survey of Techniques for Mitigating Reactive Jamming Attacks in Internet of Things Networks Enos Letsoalo, Tshwane University of Technology, South Africa
A Cybercrime Incident Response Management and Recovery Framework for Kampala Metropolitan Area Alaphat Ummusalaam, Islamic University in Uganda, Uganda
Modeling Resilience in Cybersecurity: A Systems Dynamics Approach to Predictive Threat Response and Adaptive Security Policies Amos Omamo, Meru University of science and technology, Kenya
Impact of Phishing Attacks on Mobile Intelligent Agent Systems Mashako David Manyama, University of KwaZulu-Natal, South Africa
|