The swift proliferation of operating system (OS) log data and the intricacy of modern cyber
threats have shown inadequacies in traditional forensic analysis methods. Current systems have
difficulties in processing large ...
In modern cyber world information security is paramount specifically when it comes to PII and Personal Data this has been a throbbing headache for not only Sri Lankas BFSI sector but this has been a problem for almost every ...
The increasing volume and complexity of digital evidence in cybercrime investigations place huge
pressure on digital forensic tools to perform efficient and scalable analysis. Autopsy, a widely
adopted open-source ...
Modern smart grid infrastructures require highly context-specific and standards-compliant
cybersecurity policies to safeguard complex, dynamic energy networks. However, manual policy
development and generic templates ...
Insecure electronic voting systems can create serious problems for voters and stakeholders who
rely on accurate results. Unauthorized manipulation of e-voting data can drastically change the
outcome of an election or ...
Researcher have proposed and implemented Explainable AI (XAI) techniques for spam email and SMS detection using deep learning models. The primary goal is to enhance the transparency, interpretability, and trustworthiness ...
Money laundering remains a critical global threat, with financial institutions struggling to
detect complex and evolving laundering schemes within vast volumes of transactional data.
This study focuses on identifying ...
The rise of digital media manipulation has made image forgery detection essential in digital
forensics. Traditional approaches using only handcrafted or deep learning features often
struggle with limited scope and ...
In the field of digital forensics, the increasing volume of evidence and the use of fragmented
command line tools significantly hinder the speed and efficiency of forensic investigations.
Eric Zimmerman’s forensic ...
This research presents a lightweight malware detection system for Microsoft Windows Portable
Executable (PE) files using static analysis and supervised machine learning. The study
addresses the limitations of signature-based ...
Most large enterprise organizations around the world which includes banks, telcos etc. has multiple cyber security and network devices in their environments. The problem with this is that most organizations tend to acquire ...
As Kubernetes becomes the go-to orchestration platform for cloud-native applications, its dynamic and multi-tenant nature introduces complex runtime security challenges. Conventional security solutions such as firewalls, ...
"Conventional electoral systems have many of the problems of security, transparency, and
accessibility. Though promising, none of the existing blockchain implementations of solution
using Proof of Work or Proof of Stake ...
The rapid growth of quantum computing poses a significant threat to traditional cryptographic
systems, such as RSA and ECC, which are widely used to protect sensitive information in
various sectors, including finance, ...
This study investigates cybersecurity issues related to insider threat detection and mitigation in small and medium businesses (SMBs), which face unique challenges due to constrained budgets, legacy systems, and insufficient ...