Advance Smishing Detection : Using AI and Security Tools to Identify Scam messages

By: Vanna karthik; Vel Tech University, Chennai, India Abstract Smishing is a form of phishing through…

Smishing and Cybersecurity : Why Traditional Defense are No Longer Available

By: Vanna karthik; Vel Tech University, Chennai, India Abstract Society’s current cybersecurity systems have demonstrated their…

Smishing and Social Media : how Scammers are Leveraging Platforms like WhatsApp

By: Vanna karthik; Vel Tech University, Chennai, India Abstract Digital society has experienced a transformation through…

Smishing Goes Global : How Scammers are Targeting Multilingual Audiences

By: Vanna karthik; Vel Tech University, Chennai, India Abstract SMS phishing threats have shifted from containing…

The Deep Learning Advantages : Smishing Detection made Smarter

By: Vanna karthik; Vel Tech University, Chennai, India Abstract Smishing, a type of phishing that is…

Using Machine Learning to Detect and Prevent Smishing Attacks Effectively

By: Vanna karthik; Vel Tech University, Chennai, India Abstract Smishing is an evolving cyber threat relying…

What is Smishing? How to Spot and Avoid it

By: Vanna karthik; Vel Tech University, Chennai, India Abstract Combining the terms “SMS” and “phishing,” smishing…

From Smart Cities to Cyber Battlegrounds : Securing Urban IoT Networks

By: Vanna karthik; Vel Tech University, Chennai, India Abstract Urban communities have shifted into sophisticated information…

The chain of Trust : Securing IoT in Supply Chain

By: Vanna karthik; Vel Tech University, Chennai, India Abstract IoT technology has transformed our relationship with…

The Privacy Puzzle : Balancing IoT Innovation with Data Protection

By: Vanna karthik; Vel Tech University, Chennai, India Abstract : Brain machines through the Internet of…

The Rise of Rogue devices : How to Detect and Defend Against Them

By: Vanna karthik; Vel Tech University, Chennai, India Abstract The Internet of Things through its capabilities…

The Invisible War : How Cyber attackers are Shaping the Future of Technology

By: Vanna karthik; Vel Tech University, Chennai, India Abstract Modern society depends on cybersecurity as an…

IoV Under Attack : How Hackers could Hijack the future of Transportation

By: Vanna karthik; Vel Tech University, Chennai, India Abstract : Through the Internet of Vehicles (IoV)…

The Silent Threat : How IoT Devices are Becoming Cyber Weapons

By: Vanna karthik; Vel Tech University, Chennai, India Abstract Through its IoT capabilities technology has revolutionized…

When Your IoT Device Hacks You : The Hidden Danger of IoT Devices

By: Vanna karthik; Vel Tech University, Chennai, India Abstract People now use the Internet of Things…

A Taxonomy of Phishing Attacks: Classification, Trends, and Mitigation Strategies

By: Gonipalli Bharath Vel Tech University, Chennai, India International Center for AI and Cyber Security Research…

Advanced Persistent DDoS (AP-DDoS): A New Breed of Cyber Warfare

By: Gonipalli Bharath Vel Tech University, Chennai, India International Center for AI and Cyber Security Research…

Cloud-Based Phishing Attacks: How Cybercriminals Exploit SaaS and IaaS Weaknesses

By: Gonipalli Bharath Vel Tech University, Chennai, India International Center for AI and Cyber Security Research…

Edge Computing and DDoS: Can Decentralized Infrastructure Resist Attacks?

By: Gonipalli Bharath Vel Tech University, Chennai, India International Center for AI and Cyber Security Research…

Phishing in Enterprise Networks: Risks, Detection, and Mitigation

By: Gonipalli Bharath Vel Tech University, Chennai, India International Center for AI and Cyber Security Research…