By: KUKUTLA TEJONATH REDDY, IIPP Research Intern, Asia University, Taiwan, tejonath45@gmail.com Abstract: Computer forensics are a…
Category: Cyber Security & Network Forensics
Understanding Distributed Denial of Service (DDoS) Attacks and its analysis
By: Aiyaan Hasan, IIPP Research Intern, Asia University, Taiwan, rayhasan114@gmail.com Abstract: DDoS (Distributed Denial of Service)…
Sentiment Analysis In Algorithmic Trading
By: Arya Brijith, IIPP Research Intern, Asia University, Taiwan, arya.brijithk@gmail.com Abstract The generic issue faced by…
Unlocking the code of Customer Churn: Predictive Strategies for Banking Success
By: Pinaki Sahu, IIPP Research Intern, Asia University, Taiwan, 0000pinaki1234.kv@gmail.com Abstract In the world of banking,…
Defending Against DDoS Attacks: A Comprehensive Guide to vDDoS Protection tool
By: Himanshu Tiwari, IIPP Research Intern, Asia University, Taiwan; nomails1337@gmail.com Abstract: DDoS attacks pose a significant…
Unmasking Scam Calls: Analysing and Detecting Scammers using AI
By: Arya Brijith, IIPP Research Intern, Asia University, Taiwan, arya.brijithk@gmail.com Abstract For telecom firms, the surge…
Blockchain and IoT: Fortifying Trust and Integrity in a Connected World
By: Sudhakar Kumar, CCET, Punjab University, chandigarh, India In an increasingly interconnected world, the security of…
Why Does IoT Authentication Matters More Than Ever?
By: Akshat Gaurav, Ronin Institute, U.S. The Internet of Things (IoT) has been hailed as the…
IoT Security Breaches: Lessons Learned from XSS Incidents
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The Internet of Things…
AI-Driven Cloud Computing: Revolutionizing the Digital Landscape
By: Avadhesh Kumar Gupta, Unitedworld School of Computational Intelligence , Karnavati University, India The digital landscape…
Cloud-Driven AI and Blockchain: Innovations and Applications
By: Varsha Arya, Asia University, Taiwan In today’s rapidly evolving technological landscape, the convergence of cloud…
The Evolution of Phishing Attacks How Machine Learning Keeps Up
By: Varsha Arya, Asia University, Taiwan In the ever-changing landscape of cybersecurity, one threat has remained…
Advanced Techniques for Detecting Phishing URLs in Emails
By: Anupama Mishra, Swami Rama Himalayan University, Dehradun, India The digital world we inhabit today is…
Botnet Resilience: Enhancing Detection in the Digital Age
By: Akshat Gaurav, Ronin Institute, U.S. In the ever-evolving landscape of cybersecurity, the battle against botnets…
The Dark Web Unmasking Cybercriminal Activities
By: Varsha Arya, Asia University, Taiwan The Dark Web is a term that often conjures images…
Zero-Knowledge Proofs A Game- Changer for E-Commerce Privacy
By: AKSHAT GAURAV, Ronin institute, US In today’s digital age, where e-commerce transactions are an integral…
Quantum Fusion: Blazing a Trail in the World of Computation
By: Akshat Gaurav, Ronin Institute, Montclair, USA Quantum computing has long been heralded as the next…
Building Resilience Trust and Security in the Evolution to 6G Networks
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The world of telecommunications…
The Art of Proactive Protection: Exploring Cyber Threat Intelligence Mining for Cybersecurity
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong In an ever-evolving digital…
From HTTP/2 to HTTP/1: Potential Security Anomalies
By: Arti Sachan, Insights2Techinfo, U.S In the world of web protocols, HTTP/2 and HTTP/1 have played…