By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The Internet of Things…
Category: Research
Deep Learning in Healthcare Revolutionizing Diagnosis and Treatment
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The integration of deep…
Detecting Zero-Day Malware Threats with Deep Learning
By: Akshat Gaurav, Ronin Institute, US Cybersecurity is an ever-evolving battlefield, and one of the most…
Machine Learning Solutions for Monitoring Progress Towards the SDGs
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The Sustainable Development Goals…
Demystifying Cybersecurity Compliance What You Need to Know
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong In our digitally interconnected…
Quantum Technologies: Legal Implications and Regulatory Landscape
By: Akshat Gaurav, Ronin Institute, Montclair, USA Quantum technologies have emerged as a transformative force, promising…
Building Resilience Trust and Security in the Evolution to 6G Networks
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong The world of telecommunications…
Efficient Resource Management: Estimating Energy Usage in Cloud Data Centers
By: Sudhakar Kumar, CCET, Panjab University, India In today’s digital era, cloud data centers play a…
Empowering IoT Devices through Blockchain: Understanding Multichain Security
By: Akshat Gaurav, Ronin Institute US The rapid growth of the Internet of Things (IoT) has…
Unveiling the Secrets of Timeless Timing Attacks in Tor’s DNS Cache
By: Arti Sachan, Insights2Techinfo, US Tor, a renowned network for preserving online privacy, relies on DNS…
Ensuring Data Privacy and Integrity in the Age of Industry 4.0
By: Varsha Arya, Asia University, Taiwan In the era of Industry 4.0, where advanced technologies like…
Cybersecurity in Healthcare: Safeguarding the Integrity of Medical Imaging Data
By: Akshat Gaurav, Ronin Institute, US In today’s digital era, the healthcare industry heavily relies on…
The Art of Deception: Stylistic Fingerprints and the Battle Against Browser Anti-Fingerprinting
By: Varsha Arya, Department of Business Administration, Asia University, Taiwan In an era where online privacy…
Securing AI with Cryptographic Neural-Network Computation: Advancements in Privacy-Preserving Techniques
By: Sunil Kumar Singh, CCET, Panjab University, Chandigarh, India; Akshat Gaurav, Ronin Institute, Montclair, USA Artificial…
Cybersecurity in the Smart Grid: Detecting and Mitigating DDoS Attacks
By: Akshat Gaurav, Ronin Institute, US The integration of advanced technologies and communication networks in the…
Revolutionizing Voting Systems Web-Based Open-Audit Voting for a Digital Era
By: Akshat Gaurav, Ronin Institute,US The advent of technology has brought transformative changes to various aspects…
Navigating the Threat Landscape DDoS Attacks in the Era of AI and ML
By : Varsh Arya, Asia University Taiwan In today’s interconnected digital world, the frequency and sophistication…