By: Aiyaan Hasan, IIPP Research Intern, Asia University, Taiwan, rayhasan114@gmail.com Abstract In the world of cybersecurity,…
Category: Research
Privacy-Preserving Federated Learning for IoT Networks
By: Aiyaan Hasan, IIPP Research Intern, Asia University, Taiwan, rayhasan114@gmail.com Abstract As Internet of things (IoT)…
Optimizing Load Balancing Strategies for Scalable Node.js Applications Using PM2 Monitor
By: Himanshu Tiwari, IIPP Research Intern, Asia University, Taiwan, nomails1337@gmail.com Abstract: This study investigates the incorporation…
Enhancing Cybersecurity with 2FA and Future Chat-bot Integration
By: Pinaki Sahu, IIPP Research Intern, Asia University, 0000pinaki1234.kv@gmail.com Abstract In the world of cyber threats…
Simplifying Sentiment Analysis: A Beginner’s Guide
By: Pinaki Sahu, IIPP Research Intern, Asia University, 0000pinaki1234.kv@gmail.com Abstract Sentiment analysis, a foundation that is…
Understanding and Preventing Phishing Attacks
By: KUKUTLA TEJONATH REDDY, IIPP Research Intern, Asia University, Taiwan, tejonath45@gmail.com Abstract Phishing is a common…
IoT Security Breaches: Lessons Learned from XSS Incidents
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The Internet of Things…
Deep Learning in Healthcare Revolutionizing Diagnosis and Treatment
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The integration of deep…
Detecting Zero-Day Malware Threats with Deep Learning
By: Akshat Gaurav, Ronin Institute, US Cybersecurity is an ever-evolving battlefield, and one of the most…
Machine Learning Solutions for Monitoring Progress Towards the SDGs
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The Sustainable Development Goals…
Demystifying Cybersecurity Compliance What You Need to Know
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong In our digitally interconnected…
Quantum Technologies: Legal Implications and Regulatory Landscape
By: Akshat Gaurav, Ronin Institute, Montclair, USA Quantum technologies have emerged as a transformative force, promising…
Building Resilience Trust and Security in the Evolution to 6G Networks
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The world of telecommunications…
Efficient Resource Management: Estimating Energy Usage in Cloud Data Centers
By: Sudhakar Kumar, CCET, Panjab University, India In today’s digital era, cloud data centers play a…
Empowering IoT Devices through Blockchain: Understanding Multichain Security
By: Akshat Gaurav, Ronin Institute US The rapid growth of the Internet of Things (IoT) has…
Unveiling the Secrets of Timeless Timing Attacks in Tor’s DNS Cache
By: Arti Sachan, Insights2Techinfo, US Tor, a renowned network for preserving online privacy, relies on DNS…
Ensuring Data Privacy and Integrity in the Age of Industry 4.0
By: Varsha Arya, Asia University, Taiwan In the era of Industry 4.0, where advanced technologies like…
Cybersecurity in Healthcare: Safeguarding the Integrity of Medical Imaging Data
By: Akshat Gaurav, Ronin Institute, US In today’s digital era, the healthcare industry heavily relies on…