A Realistic Deployment of Named Data Networking in The Internet Of Things
“2020 Best Paper Award” for the Journal of Cyber Security and Mobility: A Realistic Deployment of Named Data Networking in The Internet Of Things.
Read More“2020 Best Paper Award” for the Journal of Cyber Security and Mobility: A Realistic Deployment of Named Data Networking in The Internet Of Things.
Read MoreDo iOS apps honour user’s privacy? Protection of user’s privacy by apps has lately emerged as a big challenge. Many
Read MoreHow to fight cybersecurity threats – theoretically and in real life – is what we deal with her at Cybersecurity
Read MoreDistributed Denial of Services (DDOS) Attacks are still one of the most persistent threats on the internet. One possibility of
Read MoreIn the previous article, I shared some of the common risks found in Network Function Virtualization (NFV) domains. In this article,
Read MoreCarrier Service Providers (CSP) around the world are eagerly adopting NFV, leveraging on its versatility and cost-effectiveness to build out
Read MoreTaking clues from nature in designing cybersecurity solutions has provided some elegant solutions to challenging problems. However, current approaches focus
Read MoreWhile financial related malware is on the rise, the definition of such is still ambiguous, specifically for malware targeting Android
Read MoreResponding to cybersecurity events quickly and accurately is vital to every organization. However, large amount of alerts and logs often
Read More