By: Akshat Gaurav, Ronin Institute US The rapid growth of the Internet of Things (IoT) has…
Category: Research
Unveiling the Secrets of Timeless Timing Attacks in Tor’s DNS Cache
By: Arti Sachan, Insights2Techinfo, US Tor, a renowned network for preserving online privacy, relies on DNS…
Ensuring Data Privacy and Integrity in the Age of Industry 4.0
By: Varsha Arya, Asia University, Taiwan In the era of Industry 4.0, where advanced technologies like…
Cybersecurity in Healthcare: Safeguarding the Integrity of Medical Imaging Data
By: Akshat Gaurav, Ronin Institute, US In today’s digital era, the healthcare industry heavily relies on…
The Art of Deception: Stylistic Fingerprints and the Battle Against Browser Anti-Fingerprinting
By: Varsha Arya, Department of Business Administration, Asia University, Taiwan In an era where online privacy…
Securing AI with Cryptographic Neural-Network Computation: Advancements in Privacy-Preserving Techniques
By: Sunil Kumar Singh, CCET, Panjab University, Chandigarh, India; Akshat Gaurav, Ronin Institute, Montclair, USA Artificial…
Cybersecurity in the Smart Grid: Detecting and Mitigating DDoS Attacks
By: Akshat Gaurav, Ronin Institute, US The integration of advanced technologies and communication networks in the…
Revolutionizing Voting Systems Web-Based Open-Audit Voting for a Digital Era
By: Akshat Gaurav, Ronin Institute,US The advent of technology has brought transformative changes to various aspects…
Navigating the Threat Landscape DDoS Attacks in the Era of AI and ML
By : Varsh Arya, Asia University Taiwan In today’s interconnected digital world, the frequency and sophistication…
Mitigating Speculative Vulnerabilities: Exploring the Potential of a Secret-Free Hypervisor
By: Arti Sachan, Insights2Techinfo, USA; Kwok Tai Chui , Hong Kong Metropolitan University (HKMU) , Hong Kong In…
Privacy-Preserving Sparse Vector Aggregation using Local Differential Privacy Mechanisms
By: Akshat Gaurav, Ronin Institute, USA In the era of data-driven applications and analytics, the need…
Exploring the Vulnerabilities: Security Analysis of Key Derivation in Messaging Layer Security
By: Varsha Arya, Department of Business Administration, Asia University, Taiwan In today’s interconnected world, secure communication…
AI and Creativity
Artificial intelligence (AI) is often associated with automation and optimization, but it is also increasingly being…
Ethics and AI: Examining the Critical Considerations in Developing and Utilizing Artificial Intelligence
By: Brij B. Gupta, Asia University The rapid advancement of artificial intelligence (AI) technology is revolutionizing many…
The Future of AI: Navigating the Benefits and Risks of Advancements in Artificial Intelligence
By: Brij B. Gupta, Asia University Artificial Intelligence (AI) has made tremendous progress over the past few…
Privacy Concerns Surrounding OpenAI’s ChatGPT Highlight Need for Robust AI Regulation
By: Brij B Gupta, Asia University ChatGPT is an artificial intelligence (AI) model developed by OpenAI, which…
AI-powered Chatbots: Enhancing Customer Service While Mitigating Security Risks
AI-powered chatbots are rapidly becoming a popular solution for businesses looking to improve customer service while…
The Importance of Cyber Hygiene: Best Practices for Keeping Your Data Safe
As more and more of our lives move online, it’s become increasingly important to practice good…