Blockchain for Decentralized IoT Security: Protection Against Phishing and Data Breaches

By: Soo Nee Kee1,2 1Universiti Malaya, Kuala Lumpur, Malaysia. 2International Center for AI and Cyber Security…

Phishing Threats in IoT-Based Systems: Detection and Mitigation Techniques

By: Soo Nee Kee1,2 1Universiti Malaya, Kuala Lumpur, Malaysia. 2International Center for AI and Cyber Security…

Cloud-Based Phishing Attack Detection Using Machine Learning

By: Soo Nee Kee1,2 1Universiti Malaya, Kuala Lumpur, Malaysia. 2International Center for AI and Cyber Security…

Enhancing IoT Security through Blockchain-Enabled Distributed Ledger Systems in Transportation System

By: Soo Nee Kee1,2 1Universiti Malaya, Kuala Lumpur, Malaysia. 2International Center for AI and Cyber Security…

The Technical Limitations of Generative AI Models

By: K. Sai Spoorthi, Department of computer science and engineering, Student of computer science and engineering,…

How Generative AI is shaping the Future of Design

By: K. Sai Spoorthi, Department of computer science and engineering, Student of computer science and engineering,…

Securing Your Data: Best Practices for Cloud Storage Security

By: Rishitha Chokkappagari, Department of Computer Science &Engineering, Madanapalle Institute of Technology & Science, Angallu (517325),…

PREDICTIVE ANALYTICS IN BANKING: THE ROLE OF AI

By: Syed Raiyan Ali – syedraiyanali@gmail.com, Department of computer science and Engineering( Data Science ), Student…

Spam Filters: How AI Makes Them Smarter

By: Rishitha Chokkappagari, Department of Computer Science &Engineering, Madanapalle Institute of Technology & Science, Angallu (517325),…

PREDICTIVE ANALYTICS IN BANKING: THE ROLE OF AI

By: Syed Raiyan Ali – syedraiyanali@gmail.com, Department of computer science and Engineering( Data Science ), Student…

AI in Data Security

By: Praneetha Neelapareddigari, Department of Computer Science & Engineering, Madanapalle Institute of Technology and Science, Angallu…

Utilization of ChatGPT in Educational Settings: Academic integrity is currently at an uncertain equilibrium

By: Phattanaviroj Thanaporn, Business Administration Department, Asia University, Taiwan. Email: tp.fern@gmail.com Abstract The purpose of this…

Data Driven Solutions for Traffic Congestion

By: Abhinav Singh1,  Sunil Singh1 , ⁠Sherlyana2, Ahmad Nur Badri2 1 CSE Department, Chandigarh College of…

The Evolution of Hybrid Deep Learning in Phishing Detection

By: KUKUTLA TEJONATH REDDY, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia…

The Evolution of Hybrid Deep Learning in Phishing Detection

By: KUKUTLA TEJONATH REDDY, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia…

Unlocking the Potential of Quantum Simulation in Materials Science

By: Aiyaan Hasan, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

Quantum Computing’s Impact on Cryptography: The Future of Data Security

By: Aiyaan Hasan, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

Advancements in Quantum Hardware and Qubit Technologies

By: Aiyaan Hasan, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

Natural Language Processing (NLP): Harnessing its Potential

By: Arya Brijith,International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University, Taiwan,…

Simplifying Sentiment Analysis: A Beginner’s Guide

By: Pinaki Sahu, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…