Lukasz Olejnik, “Artificial Intelligence Propaganda Factories with Language Models.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
Every component of automated troll farms powered with #AI can now be run on consumer-grade hardware. Yet the very consistency of #LLM #propaganda bots might yield itself to statistical detection. Read the new article by @lukaszolejnik.bsky.social and learn more about the issue: tinyurl.com/jwa68r9w
27.02.2026 17:51
👍 1
🔁 1
💬 0
📌 1
Lukasz Olejnik, “Artificial Intelligence Propaganda Factories with Language Models.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
Every component of automated troll farms powered with #AI can now be run on consumer-grade hardware. Yet the very consistency of #LLM #propaganda bots might yield itself to statistical detection. Read the new article by @lukaszolejnik.bsky.social and learn more about the issue: tinyurl.com/jwa68r9w
27.02.2026 17:51
👍 1
🔁 1
💬 0
📌 1
Guillermo Lopez-Rodriguez, Irais Moreno-Lopez, José-Carlos Hernández-Gutiérrez, “Cyberwarfare against Critical Infrastructures: Russia and Iran in the Gray Zone.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”
Last year Polish energy infrastructure suffered a coordinated cyberattack. According to CERT Polska (tinyurl.com/2ztp3vnj), its only goal was destruction. We find this a good moment to remind you of an article on cyberwarfare against critical infrastructure from our 2023 issue: tinyurl.com/5x8dacxp
06.02.2026 17:22
👍 0
🔁 0
💬 0
📌 0
Kennedy Njenga, Yitong He, “A Grounded Theory of SME Resilience in Network Information Security.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
In their new research article “A Grounded Theory of SME Resilience in Network Information Security” Kennedy Njenga and Yitong He present strategies to improve #cybersecurity in resource-limited small and medium-sized enterprises. Now available at our website: tinyurl.com/6cj4suzy
04.02.2026 16:19
👍 0
🔁 0
💬 0
📌 0
Cover illustration of ACIG Vol. 4, No. 1; wide band of warm-coloured lines forming a male and a female profiles against a dark blue background, along with the journal’s title and metadata. Below there is a caption “Latest issue now complete,” at the top the logos of ACIG and NASK can be seen.
Dear readers,
We are happy to announce that following the publication of the letter from our Editor-in-Chief, volume 4 of ACIG is now complete. Read the introduction to our latest issue by @agasztold.bsky.social, revisit its contents and stay tuned for this year’s papers! tinyurl.com/36aynbd7
30.01.2026 08:54
👍 1
🔁 1
💬 0
📌 0
Beginning of 2026 – where we are now at ACIG.
At the top of the image the logos of ACIG and NASK can be seen.
As of the beginning of 2026, so far ACIG has cooperated with:
👉 136 authors
👉 183 reviewers
👉 from 45 countries on 5 continents.
We are grateful for all of their work and determined to keep enabling scientific discussion in the face of rapid changes in the world of #cybersecurity.
23.01.2026 10:27
👍 0
🔁 0
💬 0
📌 0
Call for papers 2026. Submission deadline: September 30, 2026.
In the upper right corner there is a designation “2026 Volume 5, No. 1” on a teal background. At the top of the image the logos of ACIG and NASK can be seen. A human hand holding a loudspeaker emerges from behind the bottom edge of the illustration.
📢 Call for Papers
Applied Cybersecurity & Internet Governance – an #openAccess, peer-reviewed scholarly journal dedicated to multidisciplinary research on #cybersecurity – is now accepting submissions for the 2026 issue.
Author guidelines are available on the ACIG website: tinyurl.com/277nh5yg
19.01.2026 12:04
👍 1
🔁 1
💬 0
📌 0
Khutso Lebea, Sherali Zeadally, Aditya Sood, “The Role of Cybersecurity in Addressing Express Kidnappings: Challenges and Innovative Solutions.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”
Revisit the article “The Role of Cybersecurity in Addressing Express Kidnappings: Challenges and Innovative Solutions” by Khutso Lebea, Sherali Zeadally, and Aditya Sood, the first of the papers that will make up the fifth volume of ACIG in 2026. tinyurl.com/ff5rcwwn
#cybersecurity
16.01.2026 11:34
👍 0
🔁 0
💬 0
📌 0
Akanksha Pamena, Manohar Naik Sugali, “SAE-AM: Enhancing Network Intrusion Detection Using Sparse Autoencoders with Attention Modules.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
Researchers Akanksha Pamena and Manohar Naik Sugali propose an approach to intrusion detection combining deep learning for dimensionality reduction with attention modules: SAE-AM. Read their paper and learn how this method allows for 99% accuracy on benchmark datasets: tinyurl.com/nhzz9bhs
09.01.2026 14:39
👍 0
🔁 0
💬 0
📌 0
Ornella Tanga Tambwe, Clinton Ohis Aigbavboa, Opeoluwa Israel Akinradewo, Seyi Segun Stephen, “The Impact of Data Governance on Data Management in the South African Construction Industry.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
Ornella Tanga Tambwe et al. offer a case study in the present state of data protection in the construction field based on survey data from the professional community. Read the article “The Impact of Data Governance on Data Management in the South African Construction Industry”
tinyurl.com/yv2tm584
07.01.2026 14:14
👍 0
🔁 0
💬 0
📌 0
A simple white-and-blue motif of a Christmas tree bauble with a snowflake on it. At the top, the logos of NASK and ACIG are visible. At the bottom there are taglines “Merry Christmas!” and “Happy New Year.”
Esteemed readers of ACIG,
as the winter holiday season unfolds, the whole Editorial Team would like to wish you a time of peaceful rest and regeneration, as well as all the best for the coming year. Stay cyber-safe and see you soon in 2026!
19.12.2025 15:18
👍 1
🔁 0
💬 0
📌 0
Muhammad Sajid Khan, “Social Cybersecurity as Digital Resilience: The STRIDE Framework for Countering AI-Driven Information Manipulation.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
Muhammad Sajid Khan approaches the problem of AI-driven disinformation from the social cybersecurity standpoint and proposes a framework for countering this kind of threats: STRIDE – Social Threat Resilience through Integrated Detection and Engagement.
Read his new article at tinyurl.com/ywth49nv
15.12.2025 09:31
👍 1
🔁 0
💬 0
📌 0
Marco Marsili, “Cognitive Warfare, Disinformation, and Corporate Influence in Europe’s Energy Transition: Information Control, Regulation, and Human Rights Implications.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
In his new paper Marco Marsili provides an analysis of techniques and vectors of cognitive influence directed against EU’s energy transition, case studies of disinformation campaigns carried out both by state actors and corporate entities, and policy recommendations.
Read it at tinyurl.com/mup6ar7s
12.12.2025 09:58
👍 1
🔁 0
💬 0
📌 0
Natalija Parlov, Gordan Akrap, Josip Esterhajer, “Supply Chain Security and AI Risk Governance Model for Critical Infrastructure under NIS2, CER, and CRA.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
In their new paper “Supply Chain Security and AI Risk Governance Model for Critical Infrastructure under NIS2, CER, and CRA” Natalija Parlov, Gordan Akrap, and Josip Esterhajer present measures for assessment and systemic improvement of infrastructural resilience.
Now available: tinyurl.com/2scra346
05.12.2025 12:51
👍 0
🔁 0
💬 0
📌 0
Francesco Maria Ferazza, Konstantinos Mersinas, “Challenges in DevSecOps Decision-Making amid a Dearth of Valid Frameworks.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
In the new paper “Challenges in DevSecOps Decision-Making amid a Dearth of Valid Frameworks” F. M. Ferazza and K. Mersinas argue there are still no robust strategies for incorporating insights from psychology and social sciences into the process of software creation.
Learn more: tinyurl.com/4aa5rhs2
01.12.2025 14:36
👍 0
🔁 0
💬 0
📌 0
William H. Dutton, Ruth Shillair, Louise Axon, Carolin Weisser, “Structured Field Coding and its Applications to National Risk and Cybersecurity Assessments.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”
Come back to the paper “Structured Field Coding and its Applications to National Risk and Cybersecurity Assessments” by William H. Dutton, Ruth Shillair, Louise Axon, and Carolin Weisser, offering insights into the methodology of #cybersecurity data gathering and comparison.
tinyurl.com/yuuhjz5z
28.11.2025 08:05
👍 0
🔁 0
💬 0
📌 0
Jukka Ruohonen, Paul Timmers, “Vulnerability Coordination under the Cyber Resilience Act.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
More digital technologies often mean greater attack surface. Jukka Ruohonen and Paul Timmers’ new paper “Vulnerability Coordination under the Cyber Resilience Act” examines the details of disclosure and mitigation requirements set forth by the EU’s new law. Read it online at tinyurl.com/t528x97z
21.11.2025 07:22
👍 1
🔁 0
💬 0
📌 0
Emir Muhić, “Transforming the Intelligence Cycle through Adapting to Complex Environments and the Operational Dynamics of Special Warfare.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
In his new paper Emir Muhić reviews the existing approaches to so called special or hybrid warfare and develops a network model, presenting how intelligence processes can evolve towards real-time adaptability to meet the demands of today’s multi-faceted threats to public safety.
tinyurl.com/4b9k243e
14.11.2025 07:58
👍 1
🔁 1
💬 0
📌 0
Lidong Wang, Reed Mosher, Patti Duett, Terril Falls, “Predictive Modelling of a Honeypot System Based on a Markov Decision Process and a Partially Observable Markov Decision Process.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”
The paper “Predictive Modelling of a Honeypot System Based on a Markov Decision Process and a Partially Observable Markov Decision Process” provides a mathematical analysis of interactions with network honeypots under conditions of uncertainty tinyurl.com/5ezuzrvh
#cyberFriday #cybersecurity
07.11.2025 09:43
👍 1
🔁 1
💬 0
📌 0
Cover of the “ENISA Threat Landscape 2025” report. Publication date is October 2025. At the top the logos of the European Union Agency for Cybersecurity are visible.
This #cyberFriday, to conclude the #EuropeanCybersecurityMonth we recommend you the latest ENISA Threat Landscape report. This year’s edition of the analysis sketches out current trends and highlights the most important threats to the European #cybersecurity. Find it at tinyurl.com/4wezyd66
31.10.2025 07:29
👍 1
🔁 1
💬 0
📌 0
Irina Aristova, Nataliia Kapitanenko, Andrii Lyseiuk, Ievgenii Kryvolap, Oleksii Kharytonov, “Information Sovereignty under Fire: Legal Challenges for Ukraine.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
The newly published paper “Information Sovereignty under Fire: Legal Challenges for Ukraine” addresses the sovereignty aspect of regulations pertaining to #cybersecurity in Ukraine, pointing to the necessity of a coherent National Strategy of Information Sovereignty. Read it at tinyurl.com/3ze9hb62
24.10.2025 07:36
👍 2
🔁 1
💬 0
📌 0
Inda Kreso, “Cyber Threats and Vulnerability Mapping in the Energy Sector: Laying the Groundwork for Smart Grid Resilience.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
Inda Kreso’s new publication identifies the most critical cyber threats and vulnerabilities within the energy sector and provides the first comprehensive mapping between them, providing a practical foundation for aligning #cybersecurity practices with existing frameworks. tinyurl.com/mwy86bxv
22.10.2025 08:06
👍 1
🔁 1
💬 0
📌 0
Jasper Uyi Egbobamwonyi-Bedaux, “Problematisation Analytics: New Foucauldian Direction in Theory and Method for Cybersecurity and AI Governance Research.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
🚨 New article available!
In his new paper aiming at developing a holistic approach to the interplay of various factors contributing to the current #cybersecurity picture Jasper Uyi Egbobamwonyi-Bedaux provides an outline of the Problematisation Analytics framework. Read more: tinyurl.com/4x9dkf8h
20.10.2025 14:39
👍 1
🔁 1
💬 0
📌 0
Ahmad Sanmorino, Rendra Gustriansyah, Shinta Puspasari, Fauziah Afriyani, “Improving Threat Detection in Information Security with Ensemble Learning.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
🚨 New article now available online!
In their new paper Ahmad Sanmorino, Rendra Gustriansyah, Shinta Puspasari, and Fauziah Afriyani demonstrate how combining multiple machine learning algorithms may result in greater precision of cyberattack detection. Read it oline: tinyurl.com/4bbjat3v
17.10.2025 07:35
👍 2
🔁 1
💬 0
📌 0
Khutso Lebea, Sherali Zeadally, Aditya Sood, “The Role of Cybersecurity in Addressing Express Kidnappings: Challenges and Innovative Solutions.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
🚨 New article now available online!
In their paper “The Role of Cybersecurity in Addressing Express Kidnappings: Challenges and Innovative Solutions” Khutso Lebea, Sherali Zeadally and Aditya Sood analyse a particular kind of kidnapping for ransom and the ways to counter it.
tinyurl.com/ff5rcwwn
15.10.2025 10:37
👍 1
🔁 1
💬 0
📌 0
Andreanne Bergeron, “Tell Me Where You Live and I Will Tell Your P@Ssw0rd: Understanding the Macrosocial Variables Influencing Password’s Strength.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”
Do you follow the rules of making a strong password? Do people with similar background? Read the paper “Tell Me Where You Live and I Will Tell Your P@Ssw0rd: Understanding the Macrosocial Variables Influencing Password’s Strength” by Andreanne Bergeron tinyurl.com/29dr9se2
#ACIG #cybersecurity
10.10.2025 08:18
👍 1
🔁 1
💬 0
📌 0
“October is #CyberSecMonth. #ThinkB4Uclick.” In the upper right corner the logo of ECSM can be seen. Below there is a tagline “Get involved!” in a speech bubble and an address cybersecuritymonth.eu.
In October the European Cybersecurity Month campaign takes place. In Poland ECSM is coordinated by our publisher, #NASK. Dear readers from Europe and from all over the world – care to share what actions are carried out in your countries to promote cybersecurity for everyone?
#ACIG #CyberFriday #ECSM
03.10.2025 08:23
👍 1
🔁 1
💬 0
📌 0
A photograph of Anna Felkner, a woman wearing glasses and a bright blouse, looking confidently into the camera, with a white frame and semi-transparent background, alongside with the texts “Welcome on board!” and “Anna Felkner PhD joins the ACIG Editorial Team.” At the top of the image the logos of ACIG and NASK can be seen.
We have the pleasure to announce that Anna Felkner PhD, the Director of the Cybersecurity Research and Development Division at #NASK, has joined the #ACIG’s team as an Editor. Our warmest welcome!
#scientificPublishing #cyberFriday
26.09.2025 10:32
👍 1
🔁 1
💬 0
📌 0
A photograph of Joanna Kołodziej, a woman looking into the camera with a serious expression, with a white frame and semi-transparent background, alongside with the texts “Congratulations!” and “Joanna Kołodziej once again is among the top 2% of the world’s most cited scientists.” At the top of the image the logos of ACIG and NASK can be seen.
We’re proud to share that prof. Joanna Kołodziej, our author, colleague at #NASK and guest editor-to-be, has once again been recognized among the world’s top 2% most cited scientists in the ranking by Stanford University & Elsevier!
Huge congratulations!
#computerScience #scientificPublishing #ACIG
24.09.2025 11:14
👍 2
🔁 1
💬 0
📌 0
Kovid Tiwari, Ajay Kumar Phulre, Devraj Vishnu, Saravanan D “Enhancing Secure Key Management Techniques for Optimised 5G Network Slicing Security.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”
This #cyberFriday we would like to remind you about the fantastic article “Enhancing Secure Key Management Techniques for Optimised 5G Network Slicing Security” by Kovid Tiwari, Ajay Kumar Phulre, Devraj Vishnu and Saravanan D. Read it at #ACIG: tinyurl.com/2xmaslv7
19.09.2025 17:14
👍 1
🔁 1
💬 0
📌 0