By: Brij B. Gupta, Department of Computer Science and Information Engineering, Asia University, Taichung 413, Taiwan.…
Category: Research
Deep Fakes and Social Media Navigating the New Reality
By: Brij B. Gupta, Department of Computer Science and Information Engineering, Asia University, Taichung 413, Taiwan.…
Green Intelligence: Revolutionizing Resource Management with Eco-Conscious AI
By: Brij B. Gupta, Department of Computer Science and Information Engineering, Asia University, Taichung 413, Taiwan.…
Quantum Computing: The Next Frontier in Computational Power
By: Brij B. Gupta, Department of Computer Science and Information Engineering, Asia University, Taichung 413, Taiwan.…
Elliptic Curve Cryptography: A Pure Mathematical Approach to Enhancing Security
By: Farhin Tabassum Indian Institute of Technology, Kharagpur, India Email: tabassumfarhin390@kgpian.iitkgp.ac.in Abstract: This article explores Elliptic…
Security Measures in Contemporary Software Engineering
By: Karanvir Singh Khokhar1& Piyush Thakur2 1,2Department of CSE, Chandigarh College of Engineering & Technology, Chandigarh,…
Bits processing in Quantum Computing
By: 1Sahil Garg, 1Shaurya Katna 1Department of CSE, Chandigarh College of Engineering and Technology, Chandigarh, India.…
OPTIMIZING EDGE COMPUTING ROUTING PROTOCOLS THROUGH DEEP REINFORCEMENT LEARNING
By: Aditi Bansal, CSE, Chandigarh College of Engineering and Technology, Chandigarh, India, mco22381@ccet.ac.in Abstract This article…
A Meta-Learning Chatbot Assistance against Evolving Cyber-Attacks
By: Pinaki Sahu, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…
Next-Generation Chat-Bots: Exploring Quantum Computing Applications in Cybersecurity
By: Pinaki Sahu, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…
REVERSE ENGINEERING WITH DNSPY: A COMPREHENSIVE GUIDE
By: Himanshu Tiwari, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…
EXPLORING NGINX MODULES: A COMPREHENSIVE ANALYSIS
By: Himanshu Tiwari, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…
An In-Depth Analysis of Linux-Based Web Servers: Performance, Security, and Scalability
By: Himanshu Tiwari, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…
A Comparative Analysis of Paid and Open Source Web Hosting Servers: Performance, Security, and Cost Considerations
By: Himanshu Tiwari, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…
A Comparative Analysis of Nginx and Apache Web Servers: Performance, Scalability, and Features
By: Himanshu Tiwari, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…
A Comparative Analysis of Linux and macOS Operating Systems
By: Himanshu Tiwari, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…
Unveiling the Landscape of Excellence: Insights from the 2023 Clarivate Highly Cited Researchers in Cross-Field Category
In the realm of scientific and academic research, being cited by peers is a testament to…
Analyzing the 2023 Clarivate Highly Cited Researchers in Computer Science
The domain of computer science is ever-evolving, and the Clarivate Highly Cited Researchers list [1] serves…
Spotlight on Scientific Influence: The 2023 Clarivate Highly Cited Researchers
The 2023 Clarivate Highly Cited Researchers list [1], a prestigious compilation of influential scientists and social…
Battling Cyber Storms: Strategies for Effective Attack Detection in Cloud Computing
By: Ritika Bansal, Insights2Techinfo, India Email: ritika@insights2techinfo.com The realm of cloud computing has revolutionized the way businesses…