.- Security in Emerging & Advanced Technologies (AI/ML & Blockchain).
.- Security Risks in Large Language Models and General Mitigation Strategies.
.- AI-Blockchain Synergy for Next-Generation Cybersecurity Adaptive, Ethical, and Efficient Architectures.
.- From Regex to Transformers: A Hybrid Framework for Cyber Threat Indicator Extraction from Unstructured Text .
.- Towards facial expression analysis for enhanced threat detection in surveillance.
.- Securing Agricultural Sustainability: Integrating Digital Twins and Blockchain for Smart Farming.
.- Cybersecurity Governance, Policy, and National Strategies.
.- African Cyber Power: Establishing a Strategic Rationale for Offensive Cyber Power Capabilities. The Case of South Africa.
.- Addressing Evolving Cybersecurity Threats from Industrial Internet of Things (IIoT) Adoption Through Improved Cybersecurity Governance.
.- Digital Literacy and the challenge for NIST compliance in developing countries.
.- Privacy by design for GDPR Compliance Assessment.
.- Cybersecurity Education, Training, and Human Factors.
.- Identifying Gaps in the Evaluation of Security Education, Training and Awareness (SETA) Programs: A Systematic Literature Review.
.- Teaching Cybersecurity through Practice: Approaches and Insights.
.- The Influence of Cybersecurity Fatigue on Students' Compliance with Cybersecurity Measures.
.- Beyond Smoke Signals: A Conceptual Model Positioning Burnout and Quiet Quitting in Cybersecurity Professionals.
.- Security Architectures, Models, and Authentication Mechanisms.
.- Multidimensional Review of Cybersecurity Vulnerabilities in E-Government Systems: The Case of South Africa.
.- Managing Risks and Improving Cyber Resilience - Assessing Mobile Application Security using a Reference Model.
.- Enhancing Digital Wallet Security: A Systematic Comparison of Passwordless and Risk-Based Authentication Approaches.
.- Diagnosability of Attack Trees.