By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong In our digitally interconnected…
Tag: Cyber Security
The Art of Proactive Protection: Exploring Cyber Threat Intelligence Mining for Cybersecurity
By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong In an ever-evolving digital…
Breaking the Barriers of Data Reconstruction: An Exploration of Neuron Exclusivity Analysis and its Security Implications
By: Varsha Arya, Asia Uinversity, Taiwan In an era where data privacy and security are paramount,…
Cybersecurity in the Smart Grid: Detecting and Mitigating DDoS Attacks
By: Akshat Gaurav, Ronin Institute, US The integration of advanced technologies and communication networks in the…
The Importance of Cyber Hygiene: Best Practices for Keeping Your Data Safe
As more and more of our lives move online, it’s become increasingly important to practice good…
Data Poisoning Attack: Understanding the Threat and Defending Against It
By: Anupama Mishra,Swami Rama Himalayan University, Dehradun, India. Email: anupama.mishra@ieee.org As more and more organizations rely…
Building Cyber-Resilient Communication Technologies: Strategies for Enhanced Security
By: Varsha Arya, Asia University, Taiwan. Email: varshaarya21@gmail.com In today’s interconnected world, communication technologies have become…
Next-Generation Mobile Network Security: The Future of Mobile Security
By: Varsha Arya, Asia University, Taiwan. Email: varshaarya21@gmail.com With the rise of mobile technology, the need…
10 Best Practices for Cybersecurity in the Workplace in 2023
By: Arti Sachin, Insights2Techinfo, India Email: arti.sachin@insights2techinfo.com Cybersecurity is a critical concern for businesses of all…
Blockchain for IoT Security
By: K. Yadav IoT security becomes an important research topic in recent times, due to the…
Intelligent Advancement Technology in Cyber Security
By: U. Yadav Technological advances endanger cybersecurity. Indeed, the latest developments in defense practitioners’ defensive techniques…
Computer Security
By: A. Sethi, K. T. Chui, K. Yadav, A. A. El-Latif As technology has advanced, so…