Transition to Post-Quantum Cryptography

By: Manvi Saini 1& Kahishpreet Kaur 2 1,2CSE, Chandigarh College of Engineering and Technology, Chandigarh, India.…

Cybernetic Converging ML for Orchestrated Excellence in AI

By: Raj Kanwar Singh1 and Harshit Vashisht2 1,2Chandigarh College of Engineering and Technology, Chandigarh, India ABSTRACT:…

CROSS-DOMAIN DATA FUSION FOR CYBER DEFENCE

By: 1Aditi Bansal , 2Saksham Arora 1, 2CSE Department, Chandigarh College of Engineering and Technology, Chandigarh,…

An Enhanced Multi-Factor Authentication and Key Agreement Protocol in Industrial Internet of Things

By: Farhin Tabassum1 and Mosiur Rahaman2 1Indian Institute of Technology, Kharagpur, India 2International Center for AI…

Cyber Kill Chain: Enhancing Cybersecurity Strategies

By: 1Tanish Aggarwal, 1Department of CSE, Chandigarh College of Engineering & Technology, Chandigarh, India. Abstract Lockheed…

Cybersecurity in Medical Robotics

By: Vajratiya Vajrobol, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

Wireless communication and cyber security

By: Vajratiya Vajrobol, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

Zero Trust on Cyber-Security Evolution

By: Tanish Aggarwal Abstract Zero Trust introduces a concept of a security philosophy based on “never…

A Global Look at Data Breach Laws and Regulations

By: Vajratiya Vajrobol, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

UAV and Cyber threats

By: Vajratiya Vajrobol, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

Protecting UAVs using Cybersecurity Techniques

By: Vajratiya Vajrobol, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

ADS-B system and cyber defences

By: Vajratiya Vajrobol, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

Hacktivism Unveiled

By: Vajratiya Vajrobol, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

Securing Video-Sharing Platforms with Cybersecurity

By: Vajratiya Vajrobol, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

IoT Protocols: Comparing MQTT, CoAP, and HTTP for Efficient Device Communication

By: Simran Jaggi, CSE Department, Chandigarh College of Engineering and Technology, Chandigarh, India Abstract: The Internet…

Cyber Security in Healthcare

By: Arya Brijith, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

Cyber Security in Business

By: Arya Brijith, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

Man-in-the-Middle Attack

By: Arya Brijith, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

Network Traffic Analysis

By: Arya Brijith, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…

Eavesdropping Attack: Consequences and Prevention Methods

By: Arya Brijith, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…