Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (5,086)

Search Parameters:
Keywords = cyber-security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
51 pages, 1921 KB  
Review
Federated Retrieval-Augmented Generation for Cybersecurity in Resource-Constrained IoT and Edge Environments: A Deployment-Oriented Scoping Review
by Hangyu He, Xin Yuan, Kai Wu and Wei Ni
Electronics 2026, 15(7), 1409; https://doi.org/10.3390/electronics15071409 (registering DOI) - 27 Mar 2026
Abstract
Cybersecurity operations in IoT and edge environments require fast, evidence-grounded decisions under strict resource and trust constraints. While large language models can support triage and incident analysis, their parametric knowledge may be outdated and prone to hallucination. Retrieval-augmented generation (RAG) improves grounding by [...] Read more.
Cybersecurity operations in IoT and edge environments require fast, evidence-grounded decisions under strict resource and trust constraints. While large language models can support triage and incident analysis, their parametric knowledge may be outdated and prone to hallucination. Retrieval-augmented generation (RAG) improves grounding by conditioning responses on retrieved evidence, but also introduces new risks such as knowledge-base poisoning, indirect prompt injection, and embedding leakage. Federated learning enables collaborative adaptation without centralizing sensitive data, motivating federated RAG (FedRAG) architectures for distributed cybersecurity deployments. This study presents a deployment-oriented scoping review of FedRAG for cybersecurity. The review follows PRISMA-ScR reporting guidance and synthesizes 82 studies published between 2020 and 2026, identified through keyword search and citation snowballing over OpenAlex, arXiv, and Crossref. We develop a taxonomy that clarifies the components of federated systems, deployment locations, trust boundaries, and protected assets. We further map the combined RAG+FL attack surface, summarize practical defenses and system patterns, and distill actionable guidance for secure, privacy-preserving, and efficient FedRAG deployment in real-world IoT and edge scenarios. Our synthesis highlights recurring trade-offs among robustness, privacy, latency, communication overhead, and maintainability, and identifies open research priorities in benchmark design, governance mechanisms, and cross-silo evaluation protocols for practical deployment. Full article
(This article belongs to the Special Issue Novel Approaches for Deep Learning in Cybersecurity)
45 pages, 3443 KB  
Article
Novel Hybrid Nature-Inspired Metaheuristic Algorithm for Global and Engineering Design Optimization
by Hasan Kanaker, Osama Al Sayaydeh, Essam Alhroob, Nader Abdel Karim, Sami Smadi and Nurul Halimatul Asmak Ismail
Computers 2026, 15(4), 211; https://doi.org/10.3390/computers15040211 (registering DOI) - 27 Mar 2026
Abstract
Metaheuristic algorithms have become indispensable for solving high-dimensional, non-convex, and constrained optimization problems arising in science and engineering. However, no single method can simultaneously provide strong global exploration, accurate local exploitation, and robust performance across diverse problem classes. This paper proposes JADEFLO, a [...] Read more.
Metaheuristic algorithms have become indispensable for solving high-dimensional, non-convex, and constrained optimization problems arising in science and engineering. However, no single method can simultaneously provide strong global exploration, accurate local exploitation, and robust performance across diverse problem classes. This paper proposes JADEFLO, a new hybrid nature-inspired metaheuristic that couples Adaptive Differential Evolution with Optional External Archive (JADE) and Frilled Lizard Optimization (FLO) in a two-stage search framework. In the first stage, JADE drives global exploration using p-best mutation, an external archive, and adaptive control of the mutation factor and crossover rate to maintain population diversity. In the second stage, FLO performs intensive local refinement by mimicking the hunting and tree-climbing behaviors of frilled lizards through dedicated exploration and exploitation moves. The resulting algorithm has linear time complexity with respect to the population size, dimensionality, and number of iterations. JADEFLO is evaluated on the IEEE CEC 2022 single-objective benchmark suite (F1–F12) and three constrained engineering design problems (Pressure Vessel, tension/compression spring, and speed reducer), using 30 independent runs and comparisons against more than thirty state-of-the-art metaheuristics, including GA, PSO, DE variants, GWO, WOA, MFO, and FLO. The results show that JADEFLO attains the best overall rank on the CEC functions, delivers faster convergence and higher accuracy on most test cases, and matches or improves the best-known designs with markedly reduced variance. These findings indicate that JADEFLO is a promising general-purpose optimizer and a flexible foundation for future extensions to multi-objective and large-scale optimization. Full article
(This article belongs to the Special Issue Operations Research: Trends and Applications)
Show Figures

Figure 1

23 pages, 817 KB  
Article
Importance of Cybersecurity Competencies in Higher Education and for Employers
by Marko Kompara, Lili Nemec Zlatolas, Muhamed Turkanović and Marko Hölbl
Appl. Sci. 2026, 16(7), 3260; https://doi.org/10.3390/app16073260 - 27 Mar 2026
Abstract
The global shortage of qualified cybersecurity professionals continues to intensify, underscoring the need for targeted and practice-oriented education and training. This study examines and compares the cybersecurity competencies emphasized in higher education with those prioritized by employers. The findings reveal notable discrepancies between [...] Read more.
The global shortage of qualified cybersecurity professionals continues to intensify, underscoring the need for targeted and practice-oriented education and training. This study examines and compares the cybersecurity competencies emphasized in higher education with those prioritized by employers. The findings reveal notable discrepancies between academic and industry expectations. Employers, particularly larger organizations, assign the greatest importance to competencies related to organizational and human security, whereas higher education institutions tend to prioritize technical cybersecurity domains. These insights provide a foundation for designing more comprehensive and industry-aligned cybersecurity curricula and can support the development of educational pathways tailored to specific learner groups and workforce needs. Full article
(This article belongs to the Topic New Trends in Cybersecurity and Data Privacy)
31 pages, 2150 KB  
Article
Context-Aware Decision Fusion for Multimodal Access Control Under Contradictory Biometric Evidence
by Yasser Hmimou, Azedine Khiat, Hassna Bensag, Zineb Hidila and Mohamed Tabaa
Computers 2026, 15(4), 208; https://doi.org/10.3390/computers15040208 - 27 Mar 2026
Abstract
Access control systems rely increasingly on multimodal biometric and behavioral signals to enhance security and robustness against sophisticated attacks. However, when heterogeneous modalities provide conflicting evidence, such as valid biometric credentials accompanied by abnormal behavioral or acoustic patterns, traditional fusion strategies based on [...] Read more.
Access control systems rely increasingly on multimodal biometric and behavioral signals to enhance security and robustness against sophisticated attacks. However, when heterogeneous modalities provide conflicting evidence, such as valid biometric credentials accompanied by abnormal behavioral or acoustic patterns, traditional fusion strategies based on static thresholds or majority voting often fail, leading to false alarms or insecure authorization decisions. This paper addresses this critical limitation by proposing a contextual decision-making fusion framework designed to resolve conflicting multimodal evidence at the decision-making level. The proposed approach models access control as a decision-making problem in a context of uncertainty, where independent agents generate modality-specific evidence from authentication channels based on face, voice, and fingerprints. A centralized fusion mechanism integrates heterogeneous results using adaptive reliability weighting and contextual reasoning to resolve conflicts before operational decisions are made. Rather than treating each modality independently, the framework explicitly considers inconsistencies, uncertainties, and situational context when aggregating evidence. The framework is evaluated using public benchmarks, including VGGFace2, VoxCeleb2, and FVC2004, combined with controlled multimodal scenarios that induce conflicting evidence. Experimental results obtained under controlled contradiction scenarios show that the proposed fusion strategy reduces false alarms and improves decision consistency by approximately 18%. These results are interpreted within the scope of controlled multimodal simulations. Full article
Show Figures

Figure 1

27 pages, 1494 KB  
Systematic Review
Quantum Machine Learning for Phishing Detection: A Systematic Review of Current Techniques, Challenges, and Future Directions
by Yanche Ari Kustiawan and Khairil Imran Ghauth
Mach. Learn. Knowl. Extr. 2026, 8(4), 86; https://doi.org/10.3390/make8040086 - 27 Mar 2026
Abstract
Phishing remains a major cybersecurity threat, yet the application of quantum machine learning (QML) to phishing detection is still at an early stage. This study presents a systematic literature review aimed at providing a concise overview of existing QML-based approaches for phishing detection, [...] Read more.
Phishing remains a major cybersecurity threat, yet the application of quantum machine learning (QML) to phishing detection is still at an early stage. This study presents a systematic literature review aimed at providing a concise overview of existing QML-based approaches for phishing detection, identifying methodological trends, limitations, and future research directions. A PRISMA-guided review protocol was applied to peer-reviewed journal and conference articles published between 2021 and 2025, retrieved from major scientific databases. Eligible studies were analyzed in terms of QML models, feature encoding strategies, experimental settings, evaluation metrics, and study quality using an adapted Newcastle–Ottawa Scale. The results indicate that current research is limited in volume and largely focuses on hybrid quantum–classical models, particularly quantum support vector machines and variational quantum classifiers. Reported performance is highly dependent on encoding methods, circuit depth, and simulator-based experimentation, with few studies evaluating real quantum hardware. Common challenges include small datasets, lack of external validation, hardware noise, scalability constraints, and the absence of standardized benchmarks. Overall, the review suggests that QML for phishing detection remains exploratory and is not yet competitive with mature classical approaches, but it holds potential as an experimental research direction, provided that future studies address robustness, reproducibility, and practical deployment constraints. Full article
(This article belongs to the Section Thematic Reviews)
Show Figures

Graphical abstract

50 pages, 1274 KB  
Review
Human-in-the-Loop Artificial Intelligence: A Systematic Review of Concepts, Methods, and Applications
by Konstantinos Lazaros, Aristidis G. Vrahatis and Sotiris Kotsiantis
Entropy 2026, 28(4), 377; https://doi.org/10.3390/e28040377 - 26 Mar 2026
Abstract
The integration of human judgment into artificial intelligence (AI) systems has emerged as a key research direction, particularly for high-stakes applications where full automation remains insufficient. Human-in-the-Loop (HITL) AI represents a field that combines machine learning capabilities with human oversight, feedback, and decision-making [...] Read more.
The integration of human judgment into artificial intelligence (AI) systems has emerged as a key research direction, particularly for high-stakes applications where full automation remains insufficient. Human-in-the-Loop (HITL) AI represents a field that combines machine learning capabilities with human oversight, feedback, and decision-making at various stages of the AI pipeline. This survey provides a systematic review of HITL approaches, covering theoretical foundations, technical methods, ethical considerations, and domain-specific applications. We propose a unified taxonomy that categorizes HITL systems based on loop placement, interaction granularity, and temporal characteristics. This review synthesizes findings from healthcare, autonomous systems, cybersecurity, and other high-risk domains where human oversight is essential. We also examine the challenges of scalability, cognitive load, and trust calibration that affect the practical deployment of HITL systems. The final section outlines open research directions and introduces a framework for designing effective human–AI collaborative systems. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

23 pages, 1208 KB  
Article
NeSySwarm-IDS: End-to-End Differentiable Neuro-Symbolic Logic for Privacy-Preserving Intrusion Detection in UAV Swarms
by Gang Yang, Lin Ni, Tao Xia, Qinfang Shi and Jiajian Li
Appl. Sci. 2026, 16(7), 3204; https://doi.org/10.3390/app16073204 - 26 Mar 2026
Abstract
Unmanned Aerial Vehicle (UAV) swarms operating in contested environments face a critical “semantic gap” between raw, high-velocity network traffic and high-level mission security constraints, compounded by the risk of privacy leakage during collaborative learning. Existing deep learning (DL)-based Network Intrusion Detection Systems (NIDSs) [...] Read more.
Unmanned Aerial Vehicle (UAV) swarms operating in contested environments face a critical “semantic gap” between raw, high-velocity network traffic and high-level mission security constraints, compounded by the risk of privacy leakage during collaborative learning. Existing deep learning (DL)-based Network Intrusion Detection Systems (NIDSs) suffer from opacity, prohibitive resource consumption, and vulnerability to gradient leakage attacks in federated settings, while traditional rule-based systems fail to handle encrypted payloads and evolving attack patterns. To bridge this gap, we present NeSySwarm-IDS (Neuro-Symbolic Swarm Intrusion Detection System), an end-to-end differentiable neuro-symbolic framework that simultaneously achieves high accuracy, strong privacy guarantees, and built-in interpretability under resource constraints. NeSySwarm-IDS integrates an extremely lightweight 1D convolutional neural network with a differentiable Łukasiewicz fuzzy logic reasoner incorporating attack-specific rules. By aggregating only low-dimensional logic rule weights with calibrated differential privacy noise, we drastically reduce communication overhead while providing (ϵ,δ)-DP guarantees with negligible utility loss. Extensive experiments on the UAV-NIDD dataset and our self-collected dataset demonstrate that NeSySwarm-IDS achieves near-perfect detection accuracy, significantly outperforming traditional machine learning baselines despite using limited training data. A detailed case study on GPS spoofing confirms the interpretability of our approach, providing axiomatic explanations suitable for autonomous mission verification. These results establish that end-to-end neuro-symbolic learning can effectively bridge the semantic gap in UAV swarm security while ensuring privacy and interpretability, offering a practical pathway for deploying trustworthy AI in contested environments. Full article
(This article belongs to the Special Issue Cyberspace Security Technology in Computer Science)
Show Figures

Figure 1

20 pages, 403 KB  
Article
The Impact of Cybersecurity Governance on Corporate Digital Marketing: Evidence from Chinese A-Share Listed Firms
by Yushun Han and Bing He
J. Theor. Appl. Electron. Commer. Res. 2026, 21(4), 102; https://doi.org/10.3390/jtaer21040102 - 26 Mar 2026
Viewed by 89
Abstract
In the digital economy era, digital marketing has become a key strategy for firms seeking competitive advantage. However, its reliance on data has heightened exposure to cybersecurity risks. While existing research highlights the importance of digital transformation, less is known about how cybersecurity [...] Read more.
In the digital economy era, digital marketing has become a key strategy for firms seeking competitive advantage. However, its reliance on data has heightened exposure to cybersecurity risks. While existing research highlights the importance of digital transformation, less is known about how cybersecurity governance influences firms’ digital marketing activities. Drawing on signalling theory and the resource-based view, this study uses panel data from Chinese A-share listed firms during 2012–2023 to examine the impact of cybersecurity governance on digital marketing and its underlying mechanisms. The results show that effective cybersecurity governance significantly enhances firms’ digital marketing engagement. Mechanism analyses identify three channels. First, by preventing data breaches and negative incidents, firms enhance corporate reputation. Second, by creating a secure operating environment, cybersecurity governance strengthens risk-taking capacity and encourages marketing innovation. Third, by improving information disclosure and stakeholder communication, it alleviates information asymmetry. Heterogeneity analyses indicate that the positive effect is more pronounced for non-state-owned enterprises, firms in eastern regions, and high-tech firms. This study fills a gap in the literature by linking cybersecurity governance path to digital marketing and contributes to research on its economic consequences. The findings also offer practical implications for strengthening internal governance to support external market activities. Full article
Show Figures

Figure 1

38 pages, 1490 KB  
Review
Technological Advances in Energy Storage: Environmental and Cyber Challenges, Opportunities and Threats—A Review
by Piotr Filipowicz, Michał Dziuba and Bogdan Saletnik
Sustainability 2026, 18(7), 3230; https://doi.org/10.3390/su18073230 - 26 Mar 2026
Viewed by 266
Abstract
Energy storage plays a key role in the energy transition by enabling the effective integration of variable renewable energy sources such as solar and wind power and by supporting the stability and flexibility of modern energy systems. The rapid development of energy storage [...] Read more.
Energy storage plays a key role in the energy transition by enabling the effective integration of variable renewable energy sources such as solar and wind power and by supporting the stability and flexibility of modern energy systems. The rapid development of energy storage technologies has become one of the pillars of sustainable energy management; however, it simultaneously raises environmental, material, and systemic challenges. This review analyses the environmental implications of energy storage development using an integrative perspective that combines technological, environmental, and system-level analysis. The paper examines major classes of energy storage technologies, including electrochemical, mechanical and physical, thermal energy storage, and chemical pathways within Power-to-X, with particular emphasis on their technical characteristics, maturity, and life cycle environmental performance. Lithium-ion battery systems typically achieve round-trip efficiencies of 85–92% and cycle lifetimes exceeding 5000 cycles, while flow batteries may exceed 10,000 cycles under stationary operating conditions. Mechanical storage technologies such as pumped hydro provide efficiencies of approximately 70–85% with operational lifetimes exceeding several decades. Key challenges related to critical raw material availability, recycling, end-of-life management, and ecosystem impacts are discussed, highlighting the importance of sustainable production and recovery strategies in supporting the circular economy. In addition, the review addresses the consequences of insufficient reuse of secondary materials and the growing relevance of digitisation and cyber resilience of energy storage systems as indirect contributors to environmental risk. The review also considers geopolitical aspects related to critical material supply chains and the cyber security of energy storage infrastructure, emphasising their growing importance for the resilience and environmental sustainability of future energy systems. The analysis indicates that further development of energy storage technologies will significantly influence not only power systems but also transport, industry, and heat sectors. The results emphasise that sustainable deployment of energy storage requires hybrid system architectures and policy frameworks that account for environmental performance, system flexibility, and long-term resilience in line with the principles of sustainable development. Full article
Show Figures

Figure 1

31 pages, 5541 KB  
Article
Preference-Guided Reinforcement Learning for Dynamic Green Flexible Assembly Job Shop Scheduling with Learning–Forgetting Effects
by Ruyi Wang, Xiaojuan Liao, Guangzhu Chen, Yaxin Liu and Leyuan Liu
Sustainability 2026, 18(7), 3222; https://doi.org/10.3390/su18073222 - 25 Mar 2026
Viewed by 242
Abstract
With the evolution from Industry 4.0 to 5.0, flexible assembly scheduling must simultaneously address production efficiency, environmental sustainability, and human factors, while remaining adaptive to real-time disruptions. This study investigates the dynamic green scheduling problem in dual-resource Flexible Assembly Job Shops with worker [...] Read more.
With the evolution from Industry 4.0 to 5.0, flexible assembly scheduling must simultaneously address production efficiency, environmental sustainability, and human factors, while remaining adaptive to real-time disruptions. This study investigates the dynamic green scheduling problem in dual-resource Flexible Assembly Job Shops with worker learning and forgetting, aiming to minimize makespan and total energy consumption. To tackle this problem, a Hierarchical Dual-Agent Deep Reinforcement Learning algorithm (HAD-DRL) is proposed. The framework integrates a Heterogeneous Graph Neural Network to extract real-time workshop states and employs two collaborative agents, i.e., a high-level preference decision agent and a low-level scheduling execution agent. The upper agent dynamically adjusts the preference weights between economic and environmental objectives, while the lower agent generates corresponding scheduling actions. Unlike existing multi-agent methods that optimize a single objective at each step, HAD-DRL achieves adaptive coordination and balanced trade-offs among conflicting goals. Experimental results demonstrate that the proposed method outperforms heuristic and baseline DRL approaches in both objectives, validating its effectiveness and practical applicability for intelligent and sustainable manufacturing. Full article
(This article belongs to the Special Issue Sustainable Manufacturing Systems in the Context of Industry 4.0)
Show Figures

Figure 1

20 pages, 1442 KB  
Article
FedTheftDetect: Optimizing Anomaly Detection in Smart Grid Metering Systems Using Federated Learning
by Samar M. Nour, Ahmed Rady, Mohammed S. Hussien, Sameh A. Salem and Samar A. Said
Computers 2026, 15(4), 202; https://doi.org/10.3390/computers15040202 - 25 Mar 2026
Viewed by 157
Abstract
The detection of anomaly energy consumption patterns in smart grid metering systems remains a critical issue. This is due to data imbalance, privacy constraints, and the dynamic nature of consumption patterns. To address these concerns, we present a privacy-preserving and scalable anomaly detection [...] Read more.
The detection of anomaly energy consumption patterns in smart grid metering systems remains a critical issue. This is due to data imbalance, privacy constraints, and the dynamic nature of consumption patterns. To address these concerns, we present a privacy-preserving and scalable anomaly detection framework named as FedTheftDetect framework. The proposed framework integrates deep learning algorithms into a federated learning (FL) architecture through the incorporation of advanced ensemble classifiers to detect behavioral anomalies in daily consumption patterns. A real-world smart meter dataset with significant class imbalance is used to assess the suggested framework. The dataset had significant preprocessing to identify consumption-related anomalies in behavior. Experimental results demonstrate that the suggested framework outperforms the competitive centralized and distributed models. It achieves significant improvements in Accuracy, Precision, Recall, and F1-score, all of which are close to 0.95, which indicates a great predictive capability and reliability. Full article
(This article belongs to the Section ICT Infrastructures for Cybersecurity)
Show Figures

Figure 1

33 pages, 2907 KB  
Article
Reimagining Bitcoin Mining as a Virtual Energy Storage Mechanism in Grid Modernization: Enhancing Security, Sustainability, and Resilience of Smart Cities Against False Data Injection Cyberattacks
by Ehsan Naderi
Electronics 2026, 15(7), 1359; https://doi.org/10.3390/electronics15071359 - 25 Mar 2026
Viewed by 251
Abstract
The increasing penetration of intermittent renewable energy demands innovative solutions to maintain grid stability, resilience, and security in the body of smart cities. This paper presents a novel framework that redefines Bitcoin mining as a form of virtual energy storage, a flexible and [...] Read more.
The increasing penetration of intermittent renewable energy demands innovative solutions to maintain grid stability, resilience, and security in the body of smart cities. This paper presents a novel framework that redefines Bitcoin mining as a form of virtual energy storage, a flexible and controllable load capable of delivering large-scale demand response services, positioning it as a competitive alternative to traditional energy storage systems, including electrical, mechanical, thermal, chemical, and electrochemical storage solutions. By strategically aligning mining activities with grid conditions, Bitcoin mining can absorb excess electricity during periods of oversupply, converting it into digital assets, and reduce operations during times of scarcity, effectively emulating the behavior of conventional energy storage systems without the associated capital expenditures and material requirements. Beyond its operational flexibility, this paper explores the cyber–physical benefits of integrating Bitcoin mining into the power transmission systems as a defensive mechanism against false data injection (FDI) cyberattacks in smart city infrastructure. To achieve this goal, a decentralized and adaptive control strategy is proposed, in which mining loads dynamically adjust based on authenticated grid-state information, thereby improving system observability and hindering adversarial efforts to disrupt state estimation. In addition, to handle the proposed approach, this paper introduces a high-performance algorithm, a combination of quantum-augmented particle swarm optimization and wavelet-oriented whale optimization (QAPSO-WOWO). Simulation results confirm that strategic deployment of mining loads improves grid sustainability by utilizing curtailed renewables, enhances resilience by mitigating load-generation imbalances, and bolsters cybersecurity by reducing the impacts of FDI attacks. This work lays the foundation for a transdisciplinary paradigm shift, positioning Bitcoin mining not as a passive energy consumer but as an active participant in securing and stabilizing the future power grid in smart cities. Full article
Show Figures

Figure 1

16 pages, 897 KB  
Data Descriptor
A Dataset Capturing Decision Processes, Tool Interactions and Provenance Links in Autonomous AI Agents
by Yasser Hmimou, Mohamed Tabaa, Azeddine Khiat and Zineb Hidila
Data 2026, 11(4), 66; https://doi.org/10.3390/data11040066 (registering DOI) - 25 Mar 2026
Viewed by 206
Abstract
Agent-based systems built on large language models (LLMs) increasingly rely on complex internal reasoning processes, tool interactions, and memory mechanisms. However, the internal decision-making dynamics of such agents remain difficult to observe, analyze, and compare in a systematic manner. To address this limitation, [...] Read more.
Agent-based systems built on large language models (LLMs) increasingly rely on complex internal reasoning processes, tool interactions, and memory mechanisms. However, the internal decision-making dynamics of such agents remain difficult to observe, analyze, and compare in a systematic manner. To address this limitation, we present AgentSec, a curated dataset of structured agent interaction traces designed to support the analysis of agent-level reasoning and action behaviors. The dataset consists of 30 deterministic and non-redundant scenario instances, each capturing a complete agent interaction session under a fixed and validated schema. Quantitatively, the 30 released sessions comprise 67 decision nodes and 45 tool calls (73.3% successful), with provenance graphs exhibiting an average depth of 4.53 (max 7) and a maximum branching factor of 3. Scenarios are organized according to a predefined taxonomy of agent behavioral patterns, including tool success and failure modes, fallback strategies, memory conflicts and overwrites, decision rollbacks, and provenance branching structures. Each scenario encodes a distinct analytical case rather than a parametric variation, enabling focused and interpretable study of agent decision-making processes. AgentSec provides detailed records of decision traces, tool calls, memory updates, and provenance relations, and is intended to facilitate reproducible research on agent behavior analysis, auditing, and evaluation. The dataset is released alongside its schema, scenario manifest, and validation tooling to support reuse and extension by the research community. Rather than serving as a large-scale performance benchmark, AgentSec is explicitly designed as a diagnostic and unit-test suite for auditing agent-level reasoning logic and provenance consistency under controlled structural conditions. Full article
Show Figures

Figure 1

30 pages, 564 KB  
Article
A Context-Aware Cybersecurity Readiness Assessment Framework for Organisations in Developing and Emerging Environments
by Raymond Agyemang, Steven Furnell and Tim Muller
Future Internet 2026, 18(4), 178; https://doi.org/10.3390/fi18040178 - 24 Mar 2026
Viewed by 45
Abstract
Organisations increasingly face complex cybersecurity threats shaped not only by internal capabilities but also by external regulatory, institutional, and environmental conditions. While existing cybersecurity standards and maturity models provide valuable guidance, they often offer limited support for assessing organisational readiness in a manner [...] Read more.
Organisations increasingly face complex cybersecurity threats shaped not only by internal capabilities but also by external regulatory, institutional, and environmental conditions. While existing cybersecurity standards and maturity models provide valuable guidance, they often offer limited support for assessing organisational readiness in a manner that is both context-sensitive and diagnostically meaningful. This paper presents a context-aware cybersecurity readiness assessment framework designed to support organisational evaluation of cybersecurity readiness while explicitly accounting for external environmental influences. The framework adopts a two-tier architecture. Tier 1 assesses organisational awareness of and engagement with the external cybersecurity environment, including national regulatory obligations, institutional support mechanisms, and international collaboration. Tier 2 evaluates internal organisational cybersecurity readiness across governance, operational controls, awareness and culture, and external collaboration practices. The two tiers are designed to operate independently, enabling complementary interpretation without assuming deterministic relationships between external context and internal capability. The framework is developed and evaluated using a Design Science Research approach and is operationalised through a structured assessment instrument and an interpretable scoring model. Empirical validation is conducted across multiple organisational contexts operating in developing and emerging environments, with qualitative case study evidence where available. The results demonstrate that the framework differentiates meaningfully across readiness domains, avoids artificial score inflation or compression, and supports interpretable diagnosis of alignment gaps between external expectations and internal practices. The study contributes a validated assessment artefact that extends cybersecurity awareness research into a broader organisational readiness perspective. From a practical standpoint, the framework provides organisations, policymakers, and researchers with a structured tool to support incremental improvement, informed decision-making, and reflective engagement with both internal cybersecurity practices and external environmental conditions. Full article
Show Figures

Figure 1

20 pages, 1326 KB  
Systematic Review
Reimagining Traditional Workspaces Through Digitalisation and Hybrid Perspective: A Systematic Review
by Ayogeboh Epizitone and Smangele Pretty Moyane
Informatics 2026, 13(4), 46; https://doi.org/10.3390/informatics13040046 - 24 Mar 2026
Viewed by 156
Abstract
Workspace digitalisation presents a transformative shift from traditional, physically bounded offices to virtual, technology-enabled environments. Digital technologies like cloud computing, artificial intelligence, and the Internet of Things enable remote collaboration, data accessibility, and operational efficiency, thereby accelerating this transformation. Digital workspaces transcend geographical [...] Read more.
Workspace digitalisation presents a transformative shift from traditional, physically bounded offices to virtual, technology-enabled environments. Digital technologies like cloud computing, artificial intelligence, and the Internet of Things enable remote collaboration, data accessibility, and operational efficiency, thereby accelerating this transformation. Digital workspaces transcend geographical limitations, enabling a more flexible, inclusive, and adaptive work culture. They offer better work–life balance, with flexible options, reduced commuting time, and increased personal autonomy and control over commitments, compared to traditional workspaces. Despite these benefits, digitalisation creates cybersecurity, data privacy, and digital divide issues, where unequal access to digital tools and skills can exacerbate social and economic inequalities. The lack of physical interaction affects team cohesion and company culture. Hence, this paper explores these phenomena to uncover their implications and consider possible strategies to optimise workspace digitalisation, providing a comprehensive systematic review of extant literature within the study context, offering pragmatic insights and recommendations for workspaces. This study has found workspace digitalisation to be a complex, multifaceted phenomenon that provides flexibility, efficiency, and innovation, but also poses challenges that must be carefully managed. It postulates that as technology and work progress, a hybrid model that blends digital and traditional workspaces would be suited to each organisation’s needs and goals. Full article
(This article belongs to the Section Social Informatics and Digital Humanities)
Show Figures

Figure 1

Back to TopTop