The World of Computer Forensics and Its Challenges

By: KUKUTLA TEJONATH REDDY, IIPP Research Intern, Asia University, Taiwan, tejonath45@gmail.com Abstract: Computer forensics are a…

Understanding Distributed Denial of Service (DDoS) Attacks and its analysis

By: Aiyaan Hasan, IIPP Research Intern, Asia University, Taiwan, rayhasan114@gmail.com Abstract: DDoS (Distributed Denial of Service)…

Sentiment Analysis In Algorithmic Trading

By: Arya Brijith, IIPP Research Intern, Asia University, Taiwan, arya.brijithk@gmail.com Abstract The generic issue faced by…

Unlocking the code of Customer Churn: Predictive Strategies for Banking Success

By: Pinaki Sahu, IIPP Research Intern, Asia University, Taiwan, 0000pinaki1234.kv@gmail.com Abstract In the world of banking,…

Defending Against DDoS Attacks: A Comprehensive Guide to vDDoS Protection tool

By: Himanshu Tiwari, IIPP Research Intern, Asia University, Taiwan; nomails1337@gmail.com Abstract: DDoS attacks pose a significant…

Unmasking Scam Calls: Analysing and Detecting Scammers using AI

By: Arya Brijith, IIPP Research Intern, Asia University, Taiwan, arya.brijithk@gmail.com Abstract For telecom firms, the surge…

Blockchain and IoT: Fortifying Trust and Integrity in a Connected World

By: Sudhakar Kumar, CCET, Punjab University, chandigarh, India In an increasingly interconnected world, the security of…

Why Does IoT Authentication Matters More Than Ever?

By: Akshat Gaurav, Ronin Institute, U.S. The Internet of Things (IoT) has been hailed as the…

IoT Security Breaches: Lessons Learned from XSS Incidents

By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The Internet of Things…

AI-Driven Cloud Computing: Revolutionizing the Digital Landscape

By: Avadhesh Kumar Gupta, Unitedworld School of Computational Intelligence , Karnavati University, India The digital landscape…

Cloud-Driven AI and Blockchain: Innovations and Applications

By: Varsha Arya, Asia University, Taiwan In today’s rapidly evolving technological landscape, the convergence of cloud…

The Evolution of Phishing Attacks How Machine Learning Keeps Up

By: Varsha Arya, Asia University, Taiwan In the ever-changing landscape of cybersecurity, one threat has remained…

Advanced Techniques for Detecting Phishing URLs in Emails

By: Anupama Mishra, Swami Rama Himalayan University, Dehradun, India The digital world we inhabit today is…

Botnet Resilience: Enhancing Detection in the Digital Age

By: Akshat Gaurav, Ronin Institute, U.S. In the ever-evolving landscape of cybersecurity, the battle against botnets…

The Dark Web Unmasking Cybercriminal Activities

By: Varsha Arya, Asia University, Taiwan The Dark Web is a term that often conjures images…

Zero-Knowledge Proofs A Game- Changer for E-Commerce Privacy

By: AKSHAT GAURAV, Ronin institute, US In today’s digital age, where e-commerce transactions are an integral…

Quantum Fusion: Blazing a Trail in the World of Computation

By: Akshat Gaurav, Ronin Institute, Montclair, USA  Quantum computing has long been heralded as the next…

Building Resilience Trust and Security in the Evolution to 6G Networks

By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The world of telecommunications…

The Art of Proactive Protection: Exploring Cyber Threat Intelligence Mining for Cybersecurity

By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong In an ever-evolving digital…

From HTTP/2 to HTTP/1: Potential Security Anomalies

By: Arti Sachan, Insights2Techinfo, U.S In the world of web protocols, HTTP/2 and HTTP/1 have played…