Open Access
Articles
Dr. Yasmine El-Gamal, Prof. Rina Deshmukh (Author) 1
Pages: 69-76 || Published: 2024-12-29
The pervasive deployment of Internet of Things (IoT) devices, particularly in smart homes, has amplified concerns regarding user privacy. While Local Differential Privacy (LDP) offers a robust framework for preserving individual data privacy, its inherent mathematical complexity often renders it opaque to end-users, hindering effective privac... More >
Open Access
Articles
Dr. Carlos M. Ruiz, Prof. Anna Petrova (Author) 1
Pages: 1-13 || Published: 2024-12-11
Office Open XML (OOXML) documents represent a primary vector for malware distribution, capitalizing on their ubiquitous presence in modern enterprise and personal computing. The inherent complexity of the OOXML format provides a fertile ground for concealing malicious payloads, which often evade traditional security measures. Conventional det... More >
Open Access
Articles
Dr. Samuel K. Mensah, Prof. Zinaida Zuyeva, Prof. Alla Kornilova (Author) 1
Pages: 77-94 || Published: 2024-12-30
Offensive cyber operations (OCOs) have rapidly evolved into a critical component of modern statecraft and conflict, offering diverse capabilities ranging from intelligence gathering to the disruption and destruction of adversary systems. However, the inherent characteristics of cyberspace—its pervasive interconnectedness, intricate complexity... More >
Open Access
Articles
Dr. Tobias Muller, Chan Chiang, Yuan Hsiao (Author) 1
Pages: 14-34 || Published: 2024-12-17
Federated Learning (FL) offers a privacy-preserving paradigm for collaborative model training, particularly well-suited for edge computing. However, the inherent heterogeneity of edge clients—encompassing data distribution, computational capabilities, and reliability—poses significant challenges to FL's effectiveness, including performance de... More >
Open Access
Articles
Dr. Nadia M. Suleiman, Dr. Henrik L. Olsen (Author) 1
Pages: 35-43 || Published: 2024-12-22
The escalating complexity and frequency of cyber threats necessitate advanced tools for effective cyber defense. Traditional security systems, often relying on two-dimensional displays, struggle to represent the multi-faceted nature of modern cyber data, potentially overwhelming human analysts and causing data occlusion. This has led to a gro... More >
Open Access
Articles
Dr. Marko D. Horvat, Dr. Tomislav P. Radić (Author) 1
Pages: 44-56 || Published: 2024-12-25
Phishing remains a pervasive and evolving cybersecurity threat, consistently exploiting the human element as a primary vulnerability in organizational defenses. This comprehensive study investigates the efficacy of structured educational interventions combined with realistic simulated phishing attacks in bolstering end-user resilience against... More >
Open Access
Articles
Dr. Ali R. Al-Harthy, Dr. Hassan Ben Youssef, Dr. Noura Al-Mutairi (Author) 1
Pages: 57-67 || Published: 2024-12-29
The escalating sophistication of cyber threats necessitates a paradigm shift from traditional, signature-based security measures to more dynamic, intelligent defense mechanisms. This article explores the enhancement of Wazuh, a widely adopted open-source Security Information and Event Management (SIEM) solution, through the integration of mac... More >