How Cybercriminals Target IoT Devices and Strategies for Protection

By: Vanna karthik; Vel Tech University, Chennai, India Abstract The Internet of Things (IoT), which links…

Protecting the Internet of Things: The Importance of IoT Cybersecurity

By: Vanna karthik; Vel Tech University, Chennai, India Abstract The Internet of Things (IoT) has grown…

The Future of IoT: Connecting the World Securely

By: Gonipalli Bharath, Vel Tech University, Chennai, India & International Center for AI and Cyber Security…

Smart Cities and IoT: Emerging Threats and Solutions

By: Gonipalli Bharath; Vel Tech University, Chennai, India & International Center for AI and Cyber Security…

Digital Arrest Scam: Exploiting Fear and Authority to Defraud the Vulnerable

By: Brij B. Gupta1 and Akshat Gaurav2 1Department of Computer Science and Information Engineering, Asia University,…

Blockchain-Enabled Security: Revolutionizing Data Protection

By: Jampula Navaneeth1 1Vel Tech University, Chennai, India 2International Center for AI and Cyber Security Research…

Harnessing Machine Learning for Advanced Cyber Threat Detection

By: Jampula Navaneeth1 1Vel Tech University, Chennai, India 2International center for AI and Cyber Security Research…

Deep Learning Shields: How Neural Networks Detect Emerging Cyber Threats

By: Jampula Navaneeth1 1Vel Tech University, Chennai, India 2International Center for AI and Cyber Security Research…

Deep Learning in Action: Safeguarding the Digital Future from Cyber Attacks

By: Jampula Navaneeth1 1Vel Tech University, Chennai, India 2International Center for AI and Cyber Security Research…

The Role of Blockchain in Enhancing Cybersecurity Measures

By: Jampula Navaneeth1 1Vel Tech University, Chennai, India 2International Center for AI and Cyber Security Research…

Quantum-Inspired Evolutionary Optimization for Biometric Security Systems

By : Achit Katiyar1,2 1South Asian University, New Delhi, India. 2International Center for AI and Cyber…

Quantum-Inspired Evolutionary Algorithms for Robust Multi-Factor Authentication Systems

By: Achit Katiyar1,2 1South Asian University, New Delhi, India. 2International Center for AI and Cyber Security…

Quantum-Inspired Evolutionary Algorithms for Adaptive Intrusion Detection Systems

By: Achit Katiyar1,2 1South Asian University, New Delhi, India. 2International Center for AI and Cyber Security…

Enhancing Blockchain Security with Quantum-Inspired Evolutionary Algorithms

By: Achit Katiyar1,2 1South Asian University, New Delhi, India. 2International Center for AI and Cyber Security…

Blockchain-Based Security Solutions: An Overview

By: Achit Katiyar1 1 International Center for AI and Cyber Security Research and Innovations (CCRI), Asia…

Real-World Applications of Deep Learning in Phishing Detection

By: Jampula Navaneeth1 1Vel Tech University, Chennai, India 2International Center for AI and Cyber Security Research…

Exploring the Intersection of Machine Learning and Cybersecurity

By: Jampula Navaneeth1 1Vel Tech University, Chennai, India 2International Center for AI and Cyber Security Research…

Phishing Threats: How Deep Learning Can Keep You Safe

By: Jampula Navaneeth1 1Vel Tech University, Chennai, India 2International Center for AI and Cyber Security Research…

The Role of Neural Networks in Identifying Phishing Emails

By: Jampula Navaneeth1 1Vel Tech University, Chennai, India 2International Center for AI and Cyber Security Research…

A Beginners Guide to Using Machine Learning for Phishing Detection

By: Jampula Navaneeth1 1Vel Tech University, Chennai, India 2International Center for AI and Cyber Security Research…