Aqeel AhmedMeta releases MobileLLM: A new LLM for low-resource devices!So, I was going through some paper searches on arxv.org and found the recent paper by the Meta team presented at Proceedings of the 41st…Nov 2Nov 2
Aqeel AhmedAll About Latest LoRaWAN Specification V1.1Since my current research is focused on enhancing LPWAN standards security and particularly on LoRaWAN. I regularly look for any updates…Aug 26Aug 26
Aqeel AhmedUnderstanding Different Correlation Methods with Examples in PythonHello Everyone!Jun 4Jun 4
Aqeel AhmedDifferent Types of BotNet Revealed |Available in MarketContinuing my series on IoT BotNet attacks, today we will talk about different types of IoT BotNet attacks.Apr 15Apr 15
Aqeel AhmedComprehensive Review of IoT Threats and VulnerabilitiesAs defined by the International Engineering Task Force (IETF), a cyber threat is actually “a potential for violation of security, which…Apr 13Apr 13
Aqeel AhmedThe Mirai Botnet Attack: An Attack that Changed IoT Security LandscapeIn the realm of cybersecurity, few events have had as significant an impact as the Mirai Botnet attack. This tutorial aims to provide a…Apr 9Apr 9
Aqeel AhmedA Comprehensive Guide to Zero Trust Security: Protecting Your Digital Assets in Today’s WorldWelcome to a comprehensive guide on Zero Trust Security, a revolutionary approach to cybersecurity that challenges traditional notions of…Apr 8Apr 8
Aqeel AhmedTips to Win Erasmus Mundus Masters scholarships| Europe’s most prestigious scholarshipsI am the awardee of the Erasmus Mundus Joint Masters Degree( EMJMD) scholarship for the session 2020–22. These scholarships are offered by…Apr 6Apr 6
Aqeel AhmedTop 10 Cybersecurity Trends in 2024| Be Ready!Cybersecurity involves the implementation of measures to protect networks and devices from external threats. The rising focus on security…Apr 6Apr 6
Aqeel Ahmed5 Open-source Threat Intelligence Tools | I wish I had known beforeHello Everyone!Mar 26Mar 26