By: Himanshu Tiwari, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…
Category: Research
Enhancing Cybersecurity with 2FA and Future Chat-bot Integration
By: Pinaki Sahu, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…
Simplifying Sentiment Analysis: A Beginner’s Guide
By: Pinaki Sahu, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…
Understanding and Preventing Phishing Attacks
By: KUKUTLA TEJONATH REDDY, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia…
IoT Security Breaches: Lessons Learned from XSS Incidents
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The Internet of Things…
Deep Learning in Healthcare Revolutionizing Diagnosis and Treatment
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The integration of deep…
Detecting Zero-Day Malware Threats with Deep Learning
By: Akshat Gaurav, Ronin Institute, US Cybersecurity is an ever-evolving battlefield, and one of the most…
Machine Learning Solutions for Monitoring Progress Towards the SDGs
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The Sustainable Development Goals…
Demystifying Cybersecurity Compliance What You Need to Know
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong In our digitally interconnected…
Quantum Technologies: Legal Implications and Regulatory Landscape
By: Akshat Gaurav, Ronin Institute, Montclair, USA Quantum technologies have emerged as a transformative force, promising…
Building Resilience Trust and Security in the Evolution to 6G Networks
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The world of telecommunications…
Efficient Resource Management: Estimating Energy Usage in Cloud Data Centers
By: Sudhakar Kumar, CCET, Panjab University, India In today’s digital era, cloud data centers play a…
Empowering IoT Devices through Blockchain: Understanding Multichain Security
By: Akshat Gaurav, Ronin Institute US The rapid growth of the Internet of Things (IoT) has…
Unveiling the Secrets of Timeless Timing Attacks in Tor’s DNS Cache
By: Arti Sachan, Insights2Techinfo, US Tor, a renowned network for preserving online privacy, relies on DNS…
Ensuring Data Privacy and Integrity in the Age of Industry 4.0
By: Varsha Arya, Asia University, Taiwan In the era of Industry 4.0, where advanced technologies like…
Cybersecurity in Healthcare: Safeguarding the Integrity of Medical Imaging Data
By: Akshat Gaurav, Ronin Institute, US In today’s digital era, the healthcare industry heavily relies on…
The Art of Deception: Stylistic Fingerprints and the Battle Against Browser Anti-Fingerprinting
By: Varsha Arya, Department of Business Administration, Asia University, Taiwan In an era where online privacy…
Securing AI with Cryptographic Neural-Network Computation: Advancements in Privacy-Preserving Techniques
By: Sunil Kumar Singh, CCET, Panjab University, Chandigarh, India; Akshat Gaurav, Ronin Institute, Montclair, USA Artificial…