Zero Trust has been very hot topic within the industry, specifically because the industry is
changing rapidly and there is a lot more remote working happening, so zero trust Architecture
is a policy where it’s very ...
"Cyberbullying has become a pervasive issue on social networking sites, leading to severe negative impacts on victims. Despite its prevalence, a comprehensive technological solution to address this global problem remains ...
"The rush in digital transactions has underscored the importance to develop accurate and
trustworthy mechanism for detecting online payment fraud. In response to these challenges,
author propose an innovative hybrid ...
"Organisations need SOCs to combat the growing volume and complexity of cyber threats. Data overload, alert weariness, and rapid response might reduce SOC efficiency. This study
investigates SOC performance to address ...
"Mobile Health (mHealth) applications have transformed healthcare delivery by providing convenient access to medical services and health information. Nevertheless, as health data becomes more digitised, it becomes crucial ...
"Mobile Health (mHealth) applications have transformed healthcare delivery by providing convenient access to medical services and health information. Nevertheless, as health data becomes more digitised, it becomes crucial ...
"Artificial Intelligence (AI) based solutions are introducing fresh concerns regarding information security and privacy. There exists a gap in the AI supply chain security in identifying the dependencies associated with ...
"The development of automated systems has revolutionized numerous sectors, including the financial industry, where such systems are increasingly employed in loan approval processes. However, the integration of technology ...
"In an era where digital security is considered with utmost importance, the integration of
encryption with steganography stands as a perfect solution. A novel steganography tool
integrated with encryption is introduced ...
"The proliferation of Internet of Things (IoT) devices across various fields has significant benefits, but with the limited computational resource on these devices poses a challenge on applying security mechanisms which ...
"The research addresses vulnerabilities in email authentication protocols such as the Sender Policy
Framework, DomainKeys Identified Mail, and Domain-based Message Authentication,
Reporting, and Conformance, which are ...
"The management of Personally Identifiable Information (PII) within system and debugging logs
is crucial due to stringent data protection regulations such as GDPR and PDPA. These logs often
contain sensitive data that, ...
"The security of the internet's routing infrastructure is critically threatened by the vulnerabilities inherent in the Border Gateway Protocol (BGP), which is responsible for routing data between Autonomous Systems (ASes). ...
"Distributer Denial of Services attacks remain a persistent and severe threats to internet and internet infrastructure and services, causing significant financial losses and disrupting critical online operations. This these ...
"With the recent pandemic more people are either working from home or working in a hybrid model and are exposed to newer cyber risk than before requiring these employees to receive security awareness training. However, the ...
"The escalating adoption of Internet of Things (IoT) devices has necessitated robust data encryption methods to safeguard sensitive information. An essential component of encryption is generating white noise to provide a ...
"The increasing reliance on virtual learning environments in higher education calls for robust cyber security measures to safeguard sensitive data, ensure uninterrupted learning experiences, and protect against cyber ...
"The survey and interviews among researchers revealed that they are not fully aware of potential threats, and most researchers are unaware of the security frameworks. The literature survey found several existing blockchain ...
Dharmarathne, Kathriachchi Pinnawalage Don Devin Indula(IIT, 2023)
"The evolvement of technology in the digital era has changed the complexity of the lifestyle of human. With this change, the traditional systems have been migrated to web environments where the consideration on user ...
"This research report addresses the critical issue of insider threat detection in small and medium-sized enterprises (SMEs) by introducing a comprehensive framework specifically designed for this context. The problem at ...