Quantum Computing’s Impact on Cryptography: The Future of Data Security

By: Aiyaan Hasan, IIPP Research Intern, Asia University, Taiwan, rayhasan114@gmail.com Abstract In the world of cybersecurity,…

Privacy-Preserving Federated Learning for IoT Networks

By: Aiyaan Hasan, IIPP Research Intern, Asia University, Taiwan, rayhasan114@gmail.com Abstract As Internet of things (IoT)…

Optimizing Load Balancing Strategies for Scalable Node.js Applications Using PM2 Monitor

By: Himanshu Tiwari, IIPP Research Intern, Asia University, Taiwan, nomails1337@gmail.com Abstract: This study investigates the incorporation…

Enhancing Cybersecurity with 2FA and Future Chat-bot Integration

By: Pinaki Sahu, IIPP Research Intern, Asia University, 0000pinaki1234.kv@gmail.com Abstract In the world of cyber threats…

Simplifying Sentiment Analysis: A Beginner’s Guide

By: Pinaki Sahu, IIPP Research Intern, Asia University, 0000pinaki1234.kv@gmail.com Abstract Sentiment analysis, a foundation that is…

Understanding and Preventing Phishing Attacks

By: KUKUTLA TEJONATH REDDY, IIPP Research Intern, Asia University, Taiwan, tejonath45@gmail.com Abstract Phishing is a common…

IoT Security Breaches: Lessons Learned from XSS Incidents

By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The Internet of Things…

Deep Learning in Healthcare Revolutionizing Diagnosis and Treatment

By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The integration of deep…

Detecting Zero-Day Malware Threats with Deep Learning

By: Akshat Gaurav, Ronin Institute, US Cybersecurity is an ever-evolving battlefield, and one of the most…

Machine Learning Solutions for Monitoring Progress Towards the SDGs

By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The Sustainable Development Goals…

Metaverse Ecosystems and Smart Mobility: A Symbiotic Relationship

By: Varsha Arya, Asia University, Taiwan In a rapidly evolving digital landscape, two technological frontiers are…

Demystifying Cybersecurity Compliance What You Need to Know

By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong In our digitally interconnected…

Quantum Technologies: Legal Implications and Regulatory Landscape

By: Akshat Gaurav, Ronin Institute, Montclair, USA  Quantum technologies have emerged as a transformative force, promising…

Building Resilience Trust and Security in the Evolution to 6G Networks

By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The world of telecommunications…

Efficient Resource Management: Estimating Energy Usage in Cloud Data Centers

By: Sudhakar Kumar, CCET, Panjab University, India In today’s digital era, cloud data centers play a…

Empowering IoT Devices through Blockchain: Understanding Multichain Security

By: Akshat Gaurav, Ronin Institute US The rapid growth of the Internet of Things (IoT) has…

Unveiling the Secrets of Timeless Timing Attacks in Tor’s DNS Cache

By: Arti Sachan, Insights2Techinfo, US Tor, a renowned network for preserving online privacy, relies on DNS…

Ensuring Data Privacy and Integrity in the Age of Industry 4.0

By: Varsha Arya, Asia University, Taiwan In the era of Industry 4.0, where advanced technologies like…

Cybersecurity in Healthcare: Safeguarding the Integrity of Medical Imaging Data

By: Akshat Gaurav, Ronin Institute, US In today’s digital era, the healthcare industry heavily relies on…

Secure Embedded Systems on a Budget: Low-Cost Privilege Separation Strategies

By: Arti Sachan, Insights2Techinfo, USA; Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong…