Researcher Collab

About

I am a cybersecurity professional and researcher with over seven years of experience in penetration testing, vulnerability assessments, application security, and enterprise information security. My work focuses on identifying and mitigating security risks across web, mobile, network, and enterprise applications through both manual and automated testing. I have hands-on experience with tools such as Burp Suite, Kali Linux, OWASP ZAP, AppScan, WebInspect, Nessus, Nmap, and Qualys, and I align my security assessments with industry standards including OWASP Top 10, NIST, ISO 27001, and secure SDLC practices.

My professional interests include application penetration testing, threat modeling, secure code review, vulnerability management, cyber risk assessment, and regulatory compliance. I am especially interested in offensive security techniques that simulate real-world attack scenarios and help organizations strengthen their security posture through practical, actionable remediation strategies.

My academic research interests are at the intersection of artificial intelligence and cybersecurity. I am interested in how AI can enhance cybersecurity training, automate security processes, improve threat detection, support secure banking and financial systems, and address emerging cyber threats such as ransomware, deepfakes, dark web activity, IoT vulnerabilities, and quantum-era cryptographic challenges. My publications reflect a strong focus on AI-driven cybersecurity, cyber ethics, machine learning, financial technology security, and emerging digital threats.

I am also passionate about cybersecurity education, mentoring, and translating complex technical findings into clear guidance for both technical and non-technical audiences. Through my industry experience, academic research, and scholarly contributions, I aim to advance practical cybersecurity awareness, promote responsible use of emerging technologies, and contribute to building more secure and resilient digital systems.

Areas of Interest

My areas of interest are centered on cybersecurity artificial intelligence and emerging digital threats. I am particularly interested in application penetration testing vulnerability assessment secure code review threat modeling and cyber risk management. My work focuses on identifying security weaknesses in web mobile network and enterprise applications and developing practical remediation strategies to strengthen organizational security. I am also deeply interested in the role of artificial intelligence and machine learning in cybersecurity including AI-driven threat detection cybersecurity automation secure banking systems fraud detection regulatory technology and the use of AI in cybersecurity training. My research interests also include ransomware deepfakes dark web threats IoT security quantum-era cryptography cyber ethics and responsible data research.

The Ransomware Epidemic: Recent Cybersecurity Incidents Demystified

Asian Journal of Advanced Research and Reports

The pervasive threat of ransomware poses a significant risk to businesses across various scales as cybercriminals continue to exploit vulnerabilities causing severe disruptions and demanding substantial ransom payments. This review conducts a comprehensive literature review delving into recent ransomware attacks to analyze key aspects, including the targeted organizations, attack vectors, threat actors, propagation mechanisms, and the resulting business impact. The study goes beyond a surface examination by exploring the evolving nature of ransomware attacks, encompassing different types, attack vectors, and emerging tactics, such as double extortion, where cybercriminals not only encrypt data but also exfiltrate and threaten to release it publicly unless a ransom is paid. High-profile incidents, including those involving SickKids Hospital, Royal Mail, Dish Network, Five Guys, and ION are scrutinized to glean insights into the intricacies of these attacks. The review also evaluates the effectiveness of existing ransomware defenses and proposes potential strategies for organizations to counteract, identify, and manage ransomware incidents. The findings underscore the critical need for organizations to comprehend the evolving ransomware landscape and implement robust cybersecurity measures to protect both internal and external stakeholders. As ransomware continues to evolve in complexity, this study provides valuable insights emphasizing the importance of proactive defenses to mitigate the risks posed by this growing threat.

Authors: Sheetal Temara
Publish Year: 2024
Maximizing Penetration Testing Success with Effective Reconnaissance Techniques Using ChatGPT

Asian Journal of Research in Computer Science

Background/Objective: The study investigates the integration of ChatGPT, a generative pretrained transformer language model into the reconnaissance phase of penetration testing. The research aims to enhance the efficiency and depth of information gathering during critical security assessments offering potential improvements to traditional approaches. Research Problem: The research study addresses the challenge of optimizing the reconnaissance phase in penetration testing. It seeks to provide a solution by exploring the capabilities of ChatGPT in extracting valuable data, such as various aspects of the digital footprint or infrastructure of a system or an organization. The scope of the research relies in demonstrating how ChatGPT can contribute to the planning phase of penetration testing, guiding the selection of tactics, tools, and techniques for identifying and mitigating potential risks that could be used to assist with securing Internet accessible assets of a system or an organization. Methodology: The research adopts a case study methodology to assess the effectiveness of ChatGPT in reconnaissance. Tailored questions are formulated to extract specific information relevant to penetration testing. The study highlights the importance of prompt engineering emphasizing the need for carefully constructed questions to ensure usable results. Results: The research showcases the ability of ChatGPT to provide diverse and insightful reconnaissance information. The extracted data includes IP address ranges, domain names, vendor technologies, SSL/TLS ciphers, and network protocols. The information gathering improves efficiency of the reconnaissance phase aiding penetration testers in planning subsequent phases of the assessment. Discussion: The research study extends to the broader field of cybersecurity where artificial intelligence language models can play a valuable role in enhancing the success of reconnaissance in penetration testing. The research suggests that integrating ChatGPT into penetration testing can bring about positive changes in the efficiency and depth of information obtained during reconnaissance. Conclusion: The results of the study determine that incorporating ChatGPT in the reconnaissance phase significantly benefits penetration testers by offering valuable insights and streamlining subsequent assessment planning. The results affirm ChatGPT as a pivotal tool in maximizing success in penetration testing, contributing to ongoing advancements in cybersecurity practices.

Authors: Sheetal Temara
Publish Year: 2024
Cryptography Innovations for Securing Data in the Quantum Computing Era: Integrating Machine Learning for Enhanced Security

The rise of quantum computing introduces substantial risks to traditional cryptographic protocols, which are vulnerable to quantum decryption methods such as Shor’s algorithm. To address these emerging threats, this paper proposes an innovative cryptographic framework that integrates machine learning (ML) techniques to enhance data security in the quantum computing era. Our approach leverages ML-driven anomaly detection, adaptive key management, and predictive analytics to create a flexible and resilient cryptographic defense. The system’s anomaly detection module utilizes neural networks to identify potential quantum-based decryption attempts, while reinforcement learning optimizes key generation and distribution in response to detected threats. Experimental results demonstrate that the proposed ML-augmented framework significantly improves anomaly detection accuracy and reduces vulnerability to quantum decryption attempts by dynamically adjusting cryptographic parameters. These findings underscore the potential of machine learning to strengthen cryptographic systems, making them adaptable to the advanced threats posed by quantum computing.

Authors: Sheetal Temara, L. Bhagyalakshmi, Sanjay Kumar Suman, M. Shakunthala, N. Thulasi Chitra, Kishor Golla
Publish Year: 2025
Maximizing Penetration Testing Success with Effective Reconnaissance Techniques using ChatGPT

ChatGPT is a generative pretrained transformer language model created using artificial intelligence implemented as chatbot which can provide very detailed responses to a wide variety of questions. As a very contemporary phenomenon, this tool has a wide variety of potential use cases that have yet to be explored. With the significant extent of information on a broad assortment of potential topics, ChatGPT could add value to many information security uses cases both from an efficiency perspective as well as to offer another source of security information that could be used to assist with securing Internet accessible assets of organizations. One information security practice that could benefit from ChatGPT is the reconnaissance phase of penetration testing. This research uses a case study methodology to explore and investigate the uses of ChatGPT in obtaining valuable reconnaissance data. ChatGPT is able to provide many types of intel regarding targeted properties which includes Internet Protocol (IP) address ranges, domain names, network topology, vendor technologies, SSL/TLS ciphers, ports & services, and operating systems used by the target. The reconnaissance information can then be used during the planning phase of a penetration test to determine the tactics, tools, and techniques to guide the later phases of the penetration test in order to discover potential risks such as unpatched software components and security misconfiguration related issues. The study provides insights into how artificial intelligence language models can be used in cybersecurity and contributes to the advancement of penetration testing techniques.

Authors: Sheetal Temara
Publish Year: 2023
Investigating the Role of AI in Personalized Consumer Banking Experiences

This research examines the function of synthetic Intelligence in developing customized purchaser banking reviews. Artificial Intelligent -based total gear is increasingly being followed to offer consumers customized banking reports. Studies into the use of AI in this context will tell the layout of future banking products and services. The primary intention of this research is to understand the modern technological and personal adoption developments related to Artificial Intelligent and customized banking reviews. Particularly, this study will identify the modern use cases of Artificial Intelligent in personalized banking, look into clients' attitudes and motivations towards Artificial Intelligent -enabled banking experiences, and discover the ability possibilities and challenges related to utilizing Artificial Intelligent in growing individualized banking studies for purchasers. Additionally, the role of ethical issues in implementing and the use of Artificial Intelligent in personalized consumer banking experiences may be evaluated. This study is crucial for presenting a better understanding of the function of Artificial Intelligent in developing personalized and moral consumer banking experiences.

Authors: Piyush Rohella, Sheetal Temara, Sagar Varma Samanthapudi, Ketan Gupta, K. Suganyadevi
Publish Year: 2024
Ethics for Responsible Data Research

Advances in data mining and database management book series

In today's digital age, ethical issues are a principal concern during responsible data research which requires thoughtful consideration and approaches for managing them. As technological advances materialize to increase the standard of living for people across the world, ethics must be prioritized by cybersecurity professionals to ensure these technologies are not being misused or inflicting harm to the general population, especially to underrepresented and underprivileged communities. Cybersecurity subject matter experts must develop awareness regarding ethical ramifications of their research endeavors to ensure security is balanced with moral standards. Observance of and adherence to ethical based policies, principles, and security best practices will delineate cybersecurity professionals from threat actors.

Authors: Sheetal Temara
Publish Year: 2024
Harnessing the power of artificial intelligence to enhance next-generation cybersecurity

World Journal of Advanced Research and Reviews

Cybersecurity ecosystem is an important facet in protecting sensitive information and securing critical infrastructure for countering modern cyber threats. With the increasing complexity and frequency of security incidents, there is an escalating demand for development of innovative solutions beyond current human capabilities pertaining to cybersecurity measures. Artificial Intelligence or AI can be utilized in a myriad of areas of cybersecurity. It emerged as a technological innovation to enhance cyber protection by facilitating faster and real-time threat detection for known and unknown threats, automating processes to minimize human error, and optimal decision-making. Harnessing the power of AI in cybersecurity creates formidable defense capabilities against the constantly changing cyber threats of future while empowering the cybersecurity personnel with threat intelligence and proactive foresight to safeguard critical assets and confidential information with unparalleled precision and effectiveness. This research paper aims to investigate the potential of AI-enabled cybersecurity systems and focuses on deducing the benefits of using AI in enhancing cybersecurity processes for organizations seeking to manage their risk profile. Through a comprehensive literature review, the wide-ranging applications of AI in cybersecurity have been analyzed such as intrusion detection, predictive simulation, and automated emergency response management. The study examines the benefits of implementing AI-based cyber defenses such as improved promptness and accuracy in vulnerability assessment and threat management, reduced false positives, and recognize patterns. The future potential of AI in cybersecurity will take a leap forward in expanding protection mechanisms to evaluate the strengths and weaknesses of attack vectors to prevent an adversarial attack.

Authors: Sheetal Temara
Publish Year: 2024
THE DARK WEB AND CYBERCRIME: IDENTIFYING THREATS AND ANTICIPATING EMERGING TRENDS

Background/Objective: The Dark Web has played a pivotal role in the progress and sophistication of cybercrime.It provides an incubation network beyond the reach of traditional search engines where cybercriminals create and display exploit kits, offer illicit goods and services, and exchange confidential insider intelligence.Cybercriminals are highly adept at selecting targets, applying tools to achieve their objectives, and minimizing red tape.The increasing sophistication of cybercriminals and the exponential rise of cybercrime against critical infrastructure underlines the necessity of identifying emerging threats.This research aims to investigate the evolving threats within the Dark Web, including crimeware-as-a-service and the integration of AI/ML into cyberattacks to inform risk management strategies and strengthen security measures.Research Problem: The exponential rise in cybercrime against critical infrastructure reflects growing sophistication presenting a significant challenge to organizations and society.The motivation behind cybercrime is fundamentally driven by self-greed, which has contributed drastically to the magnitude of changes in methods used by cybercriminals to enhance profitability.The impact of cybercrime on business organizations presents an adverse effect on society and carries significant risks for the progress of individuals and the world.As cybercriminals adopt new technologies and services such as crimeware-as-a-service, identifying emerging trends becomes crucial to developing proactive strategies for detecting and preventing cyber threats.Methodology: This research employs a systematic literature review approach to analyze emerging trends in cybercrime originating from the Dark Web.The review includes scholarly articles, news sources, and blog posts from platforms like Google Scholar, IEEE Xplore, and various libraries.The key focus is to answer questions regarding the relationship between the Dark Web and Cybercrime, accelerating cybercrime activities, and the benefits and implications of these new trends.Results: Key findings of this paper range from the rise of crimeware-as-aservice attacks and the increasing use of AI and machine learning capabilities by cybercriminals to automate attacks across various businesses and organizations propounded along with information related to entry points and cybercrime attack pathways.The emergence of sophisticated cybercrime techniques, including ransomware-as-a-service, targeted AI attacks, and exploitation of IoT vulnerabilities, are critical trends.Social engineering, malware, and the rise of remote work have expanded the attack surface for Temara

Authors: Sheetal Temara
Publish Year: 2024
Using AI and Natural Language Processing to Enhance Consumer Banking Decision-Making

This technical summary outlines the use of Artificial Intelligence (AI) and Natural Language Processing (NLP) to beautify patron banking decision-making. AI-based banking systems can autonomously identify patterns in consumer information and generate insights from a number of sources, including but not restricted to purchaser 360 profiles, 1/3-party statistics, and transactional statistics. With the assistance of AI and NLP, this gadget can answer customer questions relating to their banking wishes and offer personalized recommendations. AI-based monetary decision-making systems also permit banks to offer computerized customer service with information on clients' needs, respond speedily to purchaser requests, and offer quick acclaim for loans and other banking merchandise. Moreover, AI and NLP enhance patron engagement via chatbot-like solutions and purchaser sentiment analysis. The extraordinary AI and NLP-based services being presented by using banks are mentioned in this technical abstract. In conclusion, AI and NLP technology are giving banks the capacity to meet the desires of their customers and improve typical purchaser pleasure.

Authors: Sheetal Temara, Sagar Varma Samanthapudi, Piyush Rohella, Ketan Gupta, S. R. Ashokkumar
Publish Year: 2024
Harnessing the Power of Artificial Intelligence to Enhance Next-Generation Cybersecurity

Cybersecurity ecosystem is an important facet in protecting sensitive information and securing critical infrastructure for countering modern cyber threats. With the increasing complexity and frequency of security incidents, there is an escalating demand for development of innovative solutions beyond current human capabilities pertaining to cybersecurity measures. Artificial Intelligence or AI can be utilized in a myriad of areas of cybersecurity. It emerged as a technological innovation to enhance cyber protection by facilitating faster and real-time threat detection for known and unknown threats, automating processes to minimize human error, and optimal decision-making. Harnessing the power of AI in cybersecurity creates formidable defense capabilities against the constantly changing cyber threats of future while empowering the cybersecurity personnel with threat intelligence and proactive foresight to safeguard critical assets and confidential information with unparalleled precision and effectiveness. This research paper aims to investigate the potential of AI-enabled cybersecurity systems and focuses on deducing the benefits of using AI in enhancing cybersecurity processes for organizations seeking to manage their risk profile. Through a comprehensive literature review, the wide-ranging applications of AI in cybersecurity have been analyzed such as intrusion detection, predictive simulation, and automated emergency response management. The study examines the benefits of implementing AI-based cyber defenses such as improved promptness and accuracy in vulnerability assessment and threat management, reduced false positives, and recognize patterns. The future potential of AI in cybersecurity will take a leap forward in expanding protection mechanisms to evaluate the strengths and weaknesses of attack vectors to prevent an adversarial attack.

Authors: Sheetal Temara
Publish Year: 2024
Uncovering the Benefits of Machine Learning for Automating Financial Regulatory Tasks

Machine Learning (ML) gives the ability to automate economic regulatory responsibilities in terms of price savings and more green process control. Current advances in ML have enabled the improvement of models that may interpret complicated sets of facts and automate the technique of extracting the preferred facts from these records. The development of such models gives a price-effective and efficient opportunity to greater luxurious and time-consuming guide labor. Moreover, these fashions are capable of perceiving and correctly categorizing data to ensure information accuracy and compliance with regulatory policies. It allows the company to adhere to policies without human oversight, lowering each value and time constraints. It will be further prolonged to other factors of the enterprise by making use of unsupervised fashions and fashions advanced on switch learning, together with deep learning. Those models allow the automation of responsibilities inclusive of assessing the threat associated with investments or transactions, facilitating the development of quicker and more knowledgeable techniques. Ordinary, the usage of ML fashions for financial law automatization processes is precious for decreasing price and time constraints and making sure of compliance. Through leveraging the ability of ML, financial institutions can take advantage of extra internal manner efficiency and statistics accuracy with fewer risks.

Authors: Sagar Varma Samanthapudi, Piyush Rohella, Sheetal Temara, Ketan Gupta, S. Dhanasekaran
Publish Year: 2024
The Dark Web and Cybercrime: Identifying Threats and Anticipating Emerging Trends

International Journal of Advanced Engineering Research and Science

Background/Objective: The Dark Web has played a pivotal role in the progress and sophistication of cybercrime. It provides an incubation network beyond the reach of traditional search engines where cybercriminals create and display exploit kits, offer illicit goods and services, and exchange confidential insider intelligence. Cybercriminals are highly adept at selecting targets, applying tools to achieve their objectives, and minimizing red tape. The increasing sophistication of cybercriminals and the exponential rise of cybercrime against critical infrastructure underlines the necessity of identifying emerging threats. This research aims to investigate the evolving threats within the Dark Web, including crimeware-as-a-service and the integration of AI/ML into cyberattacks to inform risk management strategies and strengthen security measures. Research Problem: The exponential rise in cybercrime against critical infrastructure reflects growing sophistication presenting a significant challenge to organizations and society. The motivation behind cybercrime is fundamentally driven by self-greed, which has contributed drastically to the magnitude of changes in methods used by cybercriminals to enhance profitability. The impact of cybercrime on business organizations presents an adverse effect on society and carries significant risks for the progress of individuals and the world. As cybercriminals adopt new technologies and services such as crimeware-as-a-service, identifying emerging trends becomes crucial to developing proactive strategies for detecting and preventing cyber threats. Methodology: This research employs a systematic literature review approach to analyze emerging trends in cybercrime originating from the Dark Web. The review includes scholarly articles, news sources, and blog posts from platforms like Google Scholar, IEEE Xplore, and various libraries. The key focus is to answer questions regarding the relationship between the Dark Web and Cybercrime, accelerating cybercrime activities, and the benefits and implications of these new trends. Results: Key findings of this paper range from the rise of crimeware-as-a-service attacks and the increasing use of AI and machine learning capabilities by cybercriminals to automate attacks across various businesses and organizations propounded along with information related to entry points and cybercrime attack pathways. The emergence of sophisticated cybercrime techniques, including ransomware-as-a-service, targeted AI attacks, and exploitation of IoT vulnerabilities, are critical trends. Social engineering, malware, and the rise of remote work have expanded the attack surface for cybercriminals. Discussion: As the use of cybercrime continues to metamorphose, the identification of new threats and extrapolation of emerging trends is critical to investigate the challenges associated with the monitoring and detection of illegitimate activities on the Dark Web as well as for the establishment of proactive risk management strategies and implementation of robust security measures. The research highlights the transformation of cybercrime into a structured and scalable ecosystem driven by technological advancements and service-based attack models. Cybercriminals now leverage AI/ML to increase the sophistication and success of their attacks. The commoditization of cybercrime has enabled less skilled individuals to participate amplifying the volume and diversity of threats faced by organizations. Conclusion: Organizations must remain vigilant and adaptable as cybercrime continues to evolve and adopt emerging technologies. The findings emphasize the need for proactive risk management, continuous monitoring of cybercrime trends, and robust security measures to mitigate the increasing threats originating from the Dark Web. Future research should focus on deeper exploration of AI-driven attacks and developing more advanced countermeasures to safeguard critical infrastructure.

Authors: Sheetal Temara
Publish Year: 2024
Retracted: An improved Personalized Customer Banking Model using Machine Learning

System getting to know has come to be a chief tool in many areas of modern-day lifestyles. One such place is patron banking. Via its predictive energy, gadget mastering has the potential to improve the manner banks interact with consumers substantially. In particular, gadget learning can supply effective and personalized carriers to clients, allowing banks to provide greater tailored solutions to personal customers. At the same time, device studying can help banks automate and streamline many strategies. By automating the execution and interpretation of patron records, banks can serve customers quicker and greater appropriately. Moreover, the system getting to know can be used to locate anomalous activities and frauds, supporting banks in defending their customers from dangers and threats. Furthermore, system-gaining knowledge can empower banks to improve their consumer segmentation, marketing, and pricing. With the aid of leveraging the information they’ve available, banks can craft new techniques and techniques to better birthday celebrations for their clients. They are able to offer greater centered rewards to customers with healthy positive profiles, as well as extra tailored offerings and pricing. In precis, device studying can revolutionize customer banking. Through their predictive and analytical skills, banks can dramatically enhance the way they interact with customers.

Authors: Piyush Rohella, Sheetal Temara, Sagar Varma Samanthapudi, T. Kiruthiga
Publish Year: 2024
ETHICS FOR RESPONSIBLE DATA RESEARCH: INTEGRATING CYBERSECURITY PERSPECTIVES IN DIGITAL ERA

The rapid evolution of technology has brought forth unprecedented opportunities and challenges in this digital era. Ethical issues in responsible data research have become a principal concern among these challenges necessitating thoughtful considerati

Authors: Sheetal Temara
Publish Year: 2024
An improved SSH optimization model for wireless security in Complex networks

The SSH (Secure Shell) protocol has been widely utilized for secure and remote access of devices over a network. However, as wireless networks become more complicated, there is a requirement for an enhanced optimization model that can take care of the security challenges that these networks impose. This paper extends the SSH optimization to accommodate characteristics of complex wireless networks and puts forward a novel framework for its application. Second, our model is based on SSH communication with complex algorithms for key exchange and authentication, making your data more secure. The model also works with the present security mechanisms on wireless networks, like encryption methods and intrusion detection systems, to offer an allinclusive solution for enhanced security. Our model is also designed to be robust and resourceful against adversary behavior by utilizing learned dynamic parameters from wireless network environments. We evaluate the performance of our model through experiments and simulations in different complex wireless networks. Our optimization model can be optimal in terms of security, efficiency, and adaptability by comparing it with existing models. The model can be deployed to different Wireless Networks and offers a reliable solution for securing remote access & management.

Authors: Sheetal Temara, Devesh Tiwari, Vivek Kumar. M, Aditya Verma, Rishi Prakash Shukla, P. Jeyanthi
Publish Year: 2024
Maximizing Penetration Testing Success with Effective Reconnaissance Techniques using ChatGPT

arXiv (Cornell University)

ChatGPT is a generative pretrained transformer language model created using artificial intelligence implemented as chatbot which can provide very detailed responses to a wide variety of questions. As a very contemporary phenomenon, this tool has a wide variety of potential use cases that have yet to be explored. With the significant extent of information on a broad assortment of potential topics, ChatGPT could add value to many information security uses cases both from an efficiency perspective as well as to offer another source of security information that could be used to assist with securing Internet accessible assets of organizations. One information security practice that could benefit from ChatGPT is the reconnaissance phase of penetration testing. This research uses a case study methodology to explore and investigate the uses of ChatGPT in obtaining valuable reconnaissance data. ChatGPT is able to provide many types of intel regarding targeted properties which includes Internet Protocol (IP) address ranges, domain names, network topology, vendor technologies, SSL/TLS ciphers, ports & services, and operating systems used by the target. The reconnaissance information can then be used during the planning phase of a penetration test to determine the tactics, tools, and techniques to guide the later phases of the penetration test in order to discover potential risks such as unpatched software components and security misconfiguration related issues. The study provides insights into how artificial intelligence language models can be used in cybersecurity and contributes to the advancement of penetration testing techniques. Keywords: ChatGPT, Penetration Testing, Reconnaissance

Authors: Sheetal Temara
Publish Year: 2023
Harnessing the Power of Artificial Intelligence to Enhance Next-Generation Cybersecurity

Preprints.org

Cybersecurity ecosystem is an important facet in protecting sensitive information and securing critical infrastructure for countering modern cyber threats. With the increasing complexity and frequency of security incidents, there is an escalating demand for development of innovative solutions beyond current human capabilities pertaining to cybersecurity measures. Artificial Intelligence or AI can be utilized in a myriad of areas of cybersecurity. It emerged as a technological innovation to enhance cyber protection by facilitating faster and real-time threat detection for known and unknown threats, automating processes to minimize human error, and optimal decision-making. Harnessing the power of AI in cybersecurity creates formidable defense capabilities against the constantly changing cyber threats of future while empowering the cybersecurity personnel with threat intelligence and proactive foresight to safeguard critical assets and confidential information with unparalleled precision and effectiveness. This research paper aims to investigate the potential of AI-enabled cybersecurity systems and focuses on deducing the benefits of using AI in enhancing cybersecurity processes for organizations seeking to manage their risk profile. Through a comprehensive literature review, the wide-ranging applications of AI in cybersecurity have been analyzed such as intrusion detection, predictive simulation, and automated emergency response management. The study examines the benefits of implementing AI-based cyber defenses such as improved promptness and accuracy in vulnerability assessment and threat management, reduced false positives, and recognize patterns. The future potential of AI in cybersecurity will take a leap forward in expanding protection mechanisms to evaluate the strengths and weaknesses of attack vectors to prevent an adversarial attack.

Authors: Sheetal Temara
Publish Year: 2024
SECURING THE DIGITAL FRONTIER

“Securing the Digital Frontier: Navigating Cyber Threats in Cloud, Network, and Information Security” offers a comprehensive exploration of the intricate landscape of Cyber security, meticulously designed to equip readers with a robust understanding of contemporary challenges and proactive strategies. With an elaborate Table of Contents spanning thirteen chapters, the book embarks on a journey that starts with laying the groundwork in Chapter 1, providing a holistic Introduction to Cyber security. Here, readers delve into the nuances of the digital realm, tracing the Evolution of Cyber Threats, and comprehending the Historical Milestones that have shaped the field. It underscores the paramount Importance of Cyber security in Modern Society and elucidates the Current State of Cyber security Challenges while speculating on Future Projections and Trends, emphasizing the Interdisciplinary Nature of Cyber security. Moving forward, Chapter 2 delves into the Fundamentals of Information Security, elucidating the CIA Triad – Confidentiality, Integrity, and Availability. It navigates through Risk Management, Compliance, and Regulatory Frameworks, shedding light on Security Policies and Procedures alongside the significance of Security Awareness Training and Incident Response Planning. Subsequent chapters systematically dissect various domains of Cyber security, from Network Security (Chapter 3) to Cloud Security (Chapter 4), Endpoint Security (Chapter 5), and Identity and Access Management (Chapter 6). Each chapter meticulously examines core concepts, methodologies, and best practices essential for fortifying digital infrastructures against evolving threats. The discourse extends to Data Protection (Chapter 7), Threat Intelligence and Detection (Chapter 8), and Incident Response and Management (Chapter 9), offering invaluable insights into encryption techniques, threat hunting strategies, and incident triage frameworks. Furthermore, Security Operations and Monitoring (Chapter 10) elucidates the pivotal role of Security Operations Centers (SOCs), Vulnerability Management, and Red Team vs. Blue Team Exercises in bolstering cyber defenses. Chapter 11 ventures into Emerging Technologies and Threats, contemplating the security ramifications of IoT, AI, Quantum Computing, Block chain, AR, VR, and Biometric Authentication. Meanwhile, Chapter 12 explores the realm of Ethical Hacking and Penetration Testing, unraveling methodologies for ethical hacking, vulnerability assessment, and social engineering mitigation. Finally, Chapter 13 prognosticates on Future Trends and Challenges, accentuating the imperative of addressing the Skills Gap, fostering Global Collaboration, and navigating Regulatory Challenges amidst burgeoning technological advancements. It underscores the ethical considerations paramount in Cyber security endeavors while advocating for resilience-building strategies against escalating cyber threats. In essence, “Securing the Digital Frontier” transcends the realms of a conventional Cyber security manual, emerging as an indispensable compendium for Cyber security professionals, aspiring enthusiasts, and stakeholders navigating the ever-evolving digital ecosystem. It amalgamates theoretical insights with practical wisdom, empowering readers to navigate the complex terrain of cyber threats with confidence and acumen.

Authors: VARUN SHAH, Sheetal Temara, Vishal Diyora, DIVYA JAIN
Publish Year: 2024
THE SCIENCE OF MACHINE LEARNING PART-1

The book titled “The Science of Machine Learning” serves as a comprehensive guide for both beginners and experienced practitioners in the field of machine learning. Covering a wide range of topics, the book provides a thorough introduction to the fundamentals of machine learning, as well as advanced techniques and emerging trends. In the first chapter, readers are introduced to the concept of machine learning, its historical context, and its importance and applications in various domains. The chapter also explores different types of machine learning and addresses key terminologies, challenges, and limitations associated with the field. The second chapter delves into the mathematical foundations essential for understanding machine learning algorithms. Topics covered include linear algebra, probability and statistics, calculus, optimization techniques, information theory basics, and numerical methods and algorithms. Moving forward, the book explores data preprocessing and exploration techniques in Chapter 3. Readers learn about data cleaning, handling missing values, feature scaling, normalization, feature engineering, exploratory data analysis (EDA), data visualization, and dimensionality reduction methods. Chapters 4 and 5 focus on supervised and unsupervised learning algorithms, respectively. Readers are introduced to popular algorithms such as linear regression, logistic regression, decision trees, random forests, support vector machines (SVM), k-nearest neighbors (k-NN), and ensemble methods for supervised learning, as well as k-means clustering, hierarchical clustering, Gaussian mixture models (GMM), principal component analysis (PCA), t-distributed stochastic neighbor embedding (t-SNE), and association rule learning for unsupervised learning. Chapter 6 explores neural networks and deep learning, covering topics such as artificial neural networks (ANN), convolutional neural networks (CNN), recurrent neural networks (RNN), long short-term memory (LSTM), and generative adversarial networks (GAN). In Chapter 7, readers learn about model evaluation and validation techniques, including cross-validation, performance metrics, bias-variance tradeoff, hyperparameter tuning, model interpretability, and explainability.

Authors: SHUBHODIP SASMAL, PUSHPA RAIKWAR DIWAN, Sheetal Temara, S. Mohammed Irfan
Publish Year: 2024
Harnessing the Power of Artificial Intelligence to Enhance Next-Generation Cybersecurity

Cybersecurity ecosystem is an important facet in protecting sensitive information and securing critical infrastructure for countering modern cyber threats. With the increasing complexity and frequency of security incidents, there is an escalating demand for development of innovative solutions beyond current human capabilities pertaining to cybersecurity measures. Artificial Intelligence or AI can be utilized in a myriad of areas of cybersecurity. It emerged as a technological innovation to enhance cyber protection by facilitating faster and real-time threat detection for known and unknown threats, automating processes to minimize human error, and optimal decision-making. Harnessing the power of AI in cybersecurity creates formidable defense capabilities against the constantly changing cyber threats of future while empowering the cybersecurity personnel with threat intelligence and proactive foresight to safeguard critical assets and confidential information with unparalleled precision and effectiveness. This research paper aims to investigate the potential of AI-enabled cybersecurity systems and focuses on deducing the benefits of using AI in enhancing cybersecurity processes for organizations seeking to manage their risk profile. Through a comprehensive literature review, the wide-ranging applications of AI in cybersecurity have been analyzed such as intrusion detection, predictive simulation, and automated emergency response management. The study examines the benefits of implementing AI-based cyber defenses such as improved promptness and accuracy in vulnerability assessment and threat management, reduced false positives, and recognize patterns. The future potential of AI in cybersecurity will take a leap forward in expanding protection mechanisms to evaluate the strengths and weaknesses of attack vectors to prevent an adversarial attack.

Authors: Sheetal Temara
Publish Year: 2024
The Dark Web And Cybercrime: Identifying Threats And Anticipating Emerging Trends

Preprints.org

Background/Objective: The Dark Web has played a pivotal role in the progress and sophistication of cybercrime. It provides an incubation network beyond the reach of traditional search engines where cybercriminals create and display exploit kits, offers illicit goods and services, and exchange confidential insider intelligence. Cybercriminals are extremely adept at selecting targets, applying tools to achieve their objectives, and minimizing red tape. The increasing sophistication of cybercriminals and the exponential rise of cybercrime against critical infrastructure underlines the necessity of identifying emerging threats. The objective of this research is to investigate the evolving threats within the Dark Web including crimeware-as-a-service and the integration of AI/ML into cyberattacks to inform risk management strategies and strengthen security measures.Research Problem: The exponential rise in cybercrime against critical infrastructure reflects growing sophisticationpresenting a significant challenge to organizations and society. The motivation behind cybercrime is fundamentally driven by self-greed which has contributed drastically to the magnitude and changes in methods used by cybercriminals to enhance profitability. The impact of cybercrime on business organizations presents an adverse impact on society and carries significant risks for the progress of individuals and the world at large. As cybercriminals adopt new technologies and services such as crimeware-as-a-service, identifying emerging trends becomes crucial to developing proactive strategies for the detection and prevention of cyber threats.Methodology: This research employs a systematic literature review approach to analyze emerging trends in cybercrime originating from the Dark Web. The review includes scholarly articles, news sources, and blog posts sourced from platforms like Google Scholar, IEEE Xplore, and various libraries. The key focus is to answer questions regarding the relationship between the Dark Web and cybercrime, accelerating cybercrime activities, and the benefits and implications of these new trends.Results: Key findings of this paper range from the rise of crimeware-as-a-service attacks and the increasing use of artificial intelligence and/or machine learning capabilities by cybercriminals to automate attacks across various businesses and organizations are also propounded along with information related to entry points and cybercrime attack pathways. The emergence of sophisticated cybercrime techniques, including ransomware-as-a-service, targeted attacks using AI, and exploitation of IoT vulnerabilities, are identified as critical trends. Social engineering, malware, and the rise of remote work have expanded the attack surface for cybercriminals.Discussion: As the use of cybercrime continues to metamorphose, the identification of new threats and extrapolation of emerging trends is critical to investigate the challenges associated with the monitoring and detection of illegitimate activities on the Dark Web as well as for the establishment of proactive risk management strategies and implementation of robust security measures. The research highlights the transformation of cybercrime into a structured and scalable ecosystem driven by technological advancements and service-based attack models. Cybercriminals now leverage AI/ML increasing the sophistication and success of their attacks. The commoditization of cybercrime has enabled less skilled individuals to participate amplifying the volume and diversity of threats faced by organizations.Conclusion: As cybercrime continues to evolve and adopt emerging technologies, organizations must remain vigilant and adaptable. The findings emphasize the need for proactive risk management, continuous monitoring of cybercrime trends, and robust security measures to mitigate the increasing threats originating from the Dark Web. Future research should focus on deeper exploration of AI-driven attacks and the development of more advanced countermeasures to safeguard critical infrastructure.

Authors: Sheetal Temara
Publish Year: 2024
Investigating the Ability of AI Algorithms to Optimize Data Access Processes

Artificial intelligence (AI) algorithms’ potential to optimize information access strategies is quickly becoming a primary awareness for businesses across theglobe. AI optimizes data access, enabling swift and precise retrieval of information. AI algorithms can analyze massive numbers of statistics and perform based on the outcomes. It also allows organizations to manage and store data more efficiently resulting in improved productivity. This paper seeks to research the capability of AI algorithms to optimize records and get the right of access to techniques. It will begin by examining the different types of AI algorithms used for data analysis, their associated benefits and characteristics, and their potential to enhance data access procedures. Subsequently, it will discuss various strategies employed to enhance the efficiency of data access procedures through AI algorithms. Ultimately, it will analyze the financial and ethical implications of leveraging AI algorithms to optimize data access procedures. The goal of this paper is to provide a comprehensive evaluation of the impact of AI algorithms on data access processes.

Authors: Sheetal Temara, Vivek Kumar. M, Devesh Tiwari, Aditya Verma, Rishi Prakash Shukla, P. Jeyanthi
Publish Year: 2024
Retracted: Secured Banking Systems for Critical Fraud Detection using Machine Learning Model

The goal of computerized fraud detection in online banking systems is to identify and save you fraudulent transactions in actual time. Device-gaining knowledge of strategies can provide a powerful means to detect anomalies in consumer behavior that might suggest feasible fraud. This consists of spotting transactions that can be out of the norm, primarily based on purchaser spending habits, and using exceptionally sophisticated algorithms to discover complex styles of fraudulent pastimes. Similarly, gadgets gaining knowledge of fashions may be used to identify suspicious consumer behavior and expect future fraudulent sports. With the aid of leveraging device learning, banks can proactively screen accounts for signs of fraud and speedy cope with online safety threats.

Authors: Sagar Varma Samanthapudi, Piyush Rohella, Sheetal Temara, T. Kiruthiga
Publish Year: 2024
Retracted: An improved machine learning model for data analysis in Big-data environment

This technical abstract offers an outline of the ability of artificial Intelligence (AI) and device studying (ML) answers for managing leverage threats in banking. Leverage is a key element in banking danger management, as it could expose the organization to disproportionate liabilities if left unchecked. AI and ML may be used to automate the tracking system of leverage hazards, allowing extra correct and welltimed identification and management of exposures. The abstract examines how AI/ML-driven solutions can leverage to be had facts to detect subtle modifications in leverage through the years, combining techniques from supervised and unsupervised ML to generate actionable insights. It then opinions viable implementation fashions and capacity challenges and gives first-rate practices for a hit implementation. The summary concludes that AI/ML-driven hazard management structures offer a promising new approach to leverage threat management inside the banking sector. In addition, research is warranted on this location.

Authors: Sheetal Temara, Sagar Varma Samanthapudi, Piyush Rohella, Ketan Gupta, T. Kiruthiga
Publish Year: 2024
The Dark Web and Cybercrime: Identifying Threats and Anticipating Emerging Trends

Background/Objective: The Dark Web has played a pivotal role in the progress and sophistication of cybercrime. It provides an incubation network beyond the reach of traditional search engines where cybercriminals create and display exploit kits, offers illicit goods and services, and exchange confidential insider intelligence. Cybercriminals are extremely adept at selecting targets, applying tools to achieve their objectives, and minimizing red tape. The increasing sophistication of cybercriminals and the exponential rise of cybercrime against critical infrastructure underlines the necessity of identifying emerging threats. The objective of this research is to investigate the evolving threats within the Dark Web including crimeware-as-a-service and the integration of AI/ML into cyberattacks to inform risk management strategies and strengthen security measures. Research Problem: The exponential rise in cybercrime against critical infrastructure reflects growing sophistication presenting a significant challenge to organizations and society. The motivation behind cybercrime is fundamentally driven by self-greed which has contributed drastically to the magnitude and changes in methods used by cybercriminals to enhance profitability. The impact of cybercrime on business organizations presents an adverse impact on society and carries significant risks for the progress of individuals and the world at large. As cybercriminals adopt new technologies and services such as crimeware-as-a-service, identifying emerging trends becomes crucial to developing proactive strategies for the detection and prevention of cyber threats. Methodology: This research employs a systematic literature review approach to analyze emerging trends in cybercrime originating from the Dark Web. The review includes scholarly articles, news sources, and blog posts sourced from platforms like Google Scholar, IEEE Xplore, and various libraries. The key focus is to answer questions regarding the relationship between the Dark Web and Cybercrime, accelerating cybercrime activities, and the benefits and implications of these new trends. Results: Key findings of this paper range from the rise of crimeware-as-a-service attacks and the increasing use of AI and/or machine learning capabilities by cybercriminals to automate attacks across various businesses and organizations are also propounded along with information related to entry points and cybercrime attack pathways. The emergence of sophisticated cybercrime techniques, including ransomware-as-a-service, targeted attacks using AI, and exploitation of IoT vulnerabilities, are identified as critical trends. Social engineering, malware, and the rise of remote work have expanded the attack surface for cybercriminals.Discussion: As the use of cybercrime continues to metamorphose, the identification of new threats and extrapolation of emerging trends is critical to investigate the challenges associated with the monitoring and detection of illegitimate activities on the Dark Web as well as for the establishment of proactive risk management strategies and implementation of robust security measures. The research highlights the transformation of cybercrime into a structured and scalable ecosystem driven by technological advancements and service-based attack models. Cybercriminals now leverage AI/ML increasing the sophistication and success of their attacks. The commoditization of cybercrime has enabled less skilled individuals to participate amplifying the volume and diversity of threats faced by organizations. Conclusion: As cybercrime continues to evolve and adopt emerging technologies, organizations must remain vigilant and adaptable. The findings emphasize the need for proactive risk management, continuous monitoring of cybercrime trends, and robust security measures to mitigate the increasing threats originating from the Dark Web. Future research should focus on deeper exploration of AI-driven attacks and the development of more advanced countermeasures to safeguard critical infrastructure.Keywords: Cybercrime, Dark Web, Cybercriminals, Hackers, AI.

Authors: Sheetal Temara
Publish Year: 2024
Ethics for Responsible Data Research: Integrating Cybersecurity Perspectives in Digital Era

Preprints.org

In today’s digital age, ethical issues are a principal concern during responsible data research which require thoughtful consideration and approaches for managing them. As technological advances materialize to increase the standard of living for people across the world, ethics must be prioritized by cybersecurity professionals to ensure these technologies are not being misused or inflicting harm to the general population especially to underrepresented and underprivileged communities. Cybersecurity subject matter experts must develop awareness regarding ethical ramifications of their research endeavors to ensure security is balanced with moral standards. Observance of and adherence to ethical based policies, principles, and security best practices will delineate cybersecurity professionals from threat actors.

Authors: Sheetal Temara
Publish Year: 2024
Ethics for Responsible Data Research: Integrating Cybersecurity Perspectives in Digital Era

In today’s digital age, ethical issues are a principal concern during responsible data research which require thoughtful consideration and approaches for managing them. As technological advances materialize to increase the standard of living for people across the world, ethics must be prioritized by cybersecurity professionals to ensure these technologies are not being misused or inflicting harm to the general population especially to underrepresented and underprivileged communities. Cybersecurity subject matter experts must develop awareness regarding ethical ramifications of their research endeavors to ensure security is balanced with moral standards. Observance of and adherence to ethical based policies, principles, and security best practices will delineate cybersecurity professionals from threat actors.

Authors: Sheetal Temara
Publish Year: 2024
Geometric Reconstruction in Modern Remote Sensing Techniques and Applications

This paper introduces a novel method for geometric reconstruction in remote sensing, combining LiDAR, SAR, deep lea0rning algorithms, and multi-sensor fusion. The proposed approach achieves a geometric reconstruction accuracy of 0.92, significantly higher than conventional methods, which average around 0.78. The method also reduces processing time to 28 seconds from the typical 45 seconds. By integrating LiDAR and SAR data, our approach enhances spatial feature extraction and reconstruction precision, making it highly effective for applications like urban planning, disaster response, and environmental monitoring. With an Intersection over Union (IoU) score of 0.88, the method demonstrates superior performance compared to traditional techniques.

Authors: Sheetal Temara, Sindhu Ravindran, Nelli Sreevidya, Sathya Krishnmoorthi, Neelamegam Devarasu, Krishna Kishore Thota
Publish Year: 2024
Retraction Notice: An improved machine learning model for data analysis in Big-data environment

This technical abstract offers an outline of the ability of artificial Intelligence (AI) and device studying (ML) answers for managing leverage threats in banking. Leverage is a key element in banking danger management, as it could expose the organization to disproportionate liabilities if left unchecked. AI and ML may be used to automate the tracking system of leverage hazards, allowing extra correct and welltimed identification and management of exposures. The abstract examines how AI/ML-driven solutions can leverage to be had facts to detect subtle modifications in leverage through the years, combining techniques from supervised and unsupervised ML to generate actionable insights. It then opinions viable implementation fashions and capacity challenges and gives first-rate practices for a hit implementation. The summary concludes that AI/ML-driven hazard management structures offer a promising new approach to leverage threat management inside the banking sector. In addition, research is warranted on this location.

Authors: Sheetal Temara, Sagar Varma Samanthapudi, Piyush Rohella, Ketan Gupta, T. Kiruthiga
Publish Year: 2024
Retraction Notice: Secured Banking Systems for Critical Fraud Detection using Machine Learning Model

The goal of computerized fraud detection in online banking systems is to identify and save you fraudulent transactions in actual time. Device-gaining knowledge of strategies can provide a powerful means to detect anomalies in consumer behavior that might suggest feasible fraud. This consists of spotting transactions that can be out of the norm, primarily based on purchaser spending habits, and using exceptionally sophisticated algorithms to discover complex styles of fraudulent pastimes. Similarly, gadgets gaining knowledge of fashions may be used to identify suspicious consumer behavior and expect future fraudulent sports. With the aid of leveraging device learning, banks can proactively screen accounts for signs of fraud and speedy cope with online safety threats.

Authors: Sagar Varma Samanthapudi, Piyush Rohella, Sheetal Temara, T. Kiruthiga
Publish Year: 2024
Retraction Notice: An improved Personalized Customer Banking Model using Machine Learning

System getting to know has come to be a chief tool in many areas of modern-day lifestyles. One such place is patron banking. Via its predictive energy, gadget mastering has the potential to improve the manner banks interact with consumers substantially. In particular, gadget learning can supply effective and personalized carriers to clients, allowing banks to provide greater tailored solutions to personal customers. At the same time, device studying can help banks automate and streamline many strategies. By automating the execution and interpretation of patron records, banks can serve customers quicker and greater appropriately. Moreover, the system getting to know can be used to locate anomalous activities and frauds, supporting banks in defending their customers from dangers and threats. Furthermore, system-gaining knowledge can empower banks to improve their consumer segmentation, marketing, and pricing. With the aid of leveraging the information they’ve available, banks can craft new techniques and techniques to better birthday celebrations for their clients. They are able to offer greater centered rewards to customers with healthy positive profiles, as well as extra tailored offerings and pricing. In precis, device studying can revolutionize customer banking. Through their predictive and analytical skills, banks can dramatically enhance the way they interact with customers.

Authors: Piyush Rohella, Sheetal Temara, Sagar Varma Samanthapudi, T. Kiruthiga
Publish Year: 2024
CYBER SECURITY ETHICS

Cyber Security Ethics- Navigation Privacy and Data Protection is a comprehensive guide designed for professionals, students, and organizations looking to understand the ethical dimensions of cyber security in a rapidly evolving digital world. This book delves into the complex intersection of technology, ethics, and law, offering a balanced perspective on how cyber security practices must align with moral responsibility and societal expectations. It provides a deep exploration of key ethical issues that arise in the protection of digital privacy, the handling of sensitive data, and the response to cyber threats, making it an essential resource for anyone navigating the modern cyber landscape. Organized into twelve in-depth chapters, the book begins with an introduction to the foundational concepts of cyber security ethics, setting the stage for a discussion on ethical frameworks, dilemmas, and professional responsibilities. As the digital age redefines privacy, Chapter 2 addresses the ethical challenges surrounding data privacy and surveillance, reinforcing privacy as a fundamental right. The subsequent chapter examines global data protection laws, including the GDPR and CCPA, and how ethical compliance plays a vital role in upholding user trust and corporate responsibility. Chapters 4 and 5 explore the ethical implications of cyber security threats and surveillance practices. From ethical hacking to the fine line between security and privacy, readers are encouraged to critically analyze how security decisions impact civil liberties. The book emphasizes that ethical strategies are essential for proactive threat prevention and transparent incident response. In Chapter 6, the focus shifts to social responsibility, highlighting how corporations must act ethically in handling consumer data, ensuring transparency, and addressing data breaches responsibly. The latter half of the book explores specialized ethical concerns in workplace monitoring, employee privacy, and insider threats. It addresses how organizations can foster a culture of ethical awareness through training and policy. The book also tackles the growing influence of artificial intelligence and automation in cyber security, exploring the risks of algorithmic bias, lack of transparency, and the need for human oversight. Globalization introduces further complexity, as Chapter 10 discusses ethical challenges in cross-border data governance and digital colonialism. The book pays special attention to the public sector, where ethical governance, national security, and public trust are critical themes. It ends with a forward-looking vision in Chapter 12, forecasting emerging ethical challenges in quantum computing, digital identity, AR/VR, and standardization. The final chapter reinforces the need for continuous ethical education, preparing the next generation of cyber professionals to tackle evolving digital threats with integrity and responsibility. Written in an accessible yet authoritative style, Cyber Security Ethics: Navigation Privacy and Data Protection is an essential addition to the library of any cyber security practitioner, educator, policymaker, or technologist. Whether you’re seeking to build ethical awareness, ensure regulatory compliance, or develop trustworthy systems, this book offers the insights and tools needed to navigate the ethical complexities of today’s interconnected world.

Authors: Sheetal Temara, AMIT KUSHWAHA, Pavan Nutalapati, Dr. SURESH KUMAR
Publish Year: 2025
The Emergence of Deepfakes as a Cyber Threat

SSRN Electronic Journal
Authors: Sheetal Temara
Publish Year: 2026
ORCID VERIFIED Dr. Sheetal T, PhD Cybersecurity
University of the Cumberlands
AI and Cybersecurity Research Collaboration
Open 2 hours, 1 minute ago

I am interested in collaborating with researchers working in cybersecurity, AI, cyber ethics, data privacy, ransomware, deepfakes, IoT secu…

United States
No collaborations yet.