Insecure electronic voting systems can create serious problems for voters and stakeholders who
rely on accurate results. Unauthorized manipulation of e-voting data can drastically change the
outcome of an election or ...
In modern cyber world information security is paramount specifically when it comes to PII and Personal Data this has been a throbbing headache for not only Sri Lankas BFSI sector but this has been a problem for almost every ...
The rapid growth of quantum computing poses a significant threat to traditional cryptographic
systems, such as RSA and ECC, which are widely used to protect sensitive information in
various sectors, including finance, ...
Researcher have proposed and implemented Explainable AI (XAI) techniques for spam email and SMS detection using deep learning models. The primary goal is to enhance the transparency, interpretability, and trustworthiness ...
Most large enterprise organizations around the world which includes banks, telcos etc. has multiple cyber security and network devices in their environments. The problem with this is that most organizations tend to acquire ...
Money laundering remains a critical global threat, with financial institutions struggling to
detect complex and evolving laundering schemes within vast volumes of transactional data.
This study focuses on identifying ...
In the field of digital forensics, the increasing volume of evidence and the use of fragmented
command line tools significantly hinder the speed and efficiency of forensic investigations.
Eric Zimmerman’s forensic ...
The increasing volume and complexity of digital evidence in cybercrime investigations place huge
pressure on digital forensic tools to perform efficient and scalable analysis. Autopsy, a widely
adopted open-source ...
The swift proliferation of operating system (OS) log data and the intricacy of modern cyber
threats have shown inadequacies in traditional forensic analysis methods. Current systems have
difficulties in processing large ...
This study investigates cybersecurity issues related to insider threat detection and mitigation in small and medium businesses (SMBs), which face unique challenges due to constrained budgets, legacy systems, and insufficient ...
"Conventional electoral systems have many of the problems of security, transparency, and
accessibility. Though promising, none of the existing blockchain implementations of solution
using Proof of Work or Proof of Stake ...
This research presents a lightweight malware detection system for Microsoft Windows Portable
Executable (PE) files using static analysis and supervised machine learning. The study
addresses the limitations of signature-based ...
Modern smart grid infrastructures require highly context-specific and standards-compliant
cybersecurity policies to safeguard complex, dynamic energy networks. However, manual policy
development and generic templates ...
The rise of digital media manipulation has made image forgery detection essential in digital
forensics. Traditional approaches using only handcrafted or deep learning features often
struggle with limited scope and ...
As Kubernetes becomes the go-to orchestration platform for cloud-native applications, its dynamic and multi-tenant nature introduces complex runtime security challenges. Conventional security solutions such as firewalls, ...