Meta releases MobileLLM: A new LLM for low-resource devices!So, I was going through some paper searches on arxv.org and found the recent paper by the Meta team presented at Proceedings of the 41st…Nov 2, 2024Nov 2, 2024
All About Latest LoRaWAN Specification V1.1Since my current research is focused on enhancing LPWAN standards security and particularly on LoRaWAN. I regularly look for any updates…Aug 26, 2024Aug 26, 2024
Understanding Different Correlation Methods with Examples in PythonHello Everyone!Jun 4, 2024Jun 4, 2024
Different Types of BotNet Revealed |Available in MarketContinuing my series on IoT BotNet attacks, today we will talk about different types of IoT BotNet attacks.Apr 15, 2024Apr 15, 2024
Comprehensive Review of IoT Threats and VulnerabilitiesAs defined by the International Engineering Task Force (IETF), a cyber threat is actually “a potential for violation of security, which…Apr 13, 2024Apr 13, 2024
The Mirai Botnet Attack: An Attack that Changed IoT Security LandscapeIn the realm of cybersecurity, few events have had as significant an impact as the Mirai Botnet attack. This tutorial aims to provide a…Apr 9, 2024Apr 9, 2024
A Comprehensive Guide to Zero Trust Security: Protecting Your Digital Assets in Today’s WorldWelcome to a comprehensive guide on Zero Trust Security, a revolutionary approach to cybersecurity that challenges traditional notions of…Apr 8, 2024Apr 8, 2024
Tips to Win Erasmus Mundus Masters scholarships| Europe’s most prestigious scholarshipsI am the awardee of the Erasmus Mundus Joint Masters Degree( EMJMD) scholarship for the session 2020–22. These scholarships are offered by…Apr 6, 2024Apr 6, 2024
Top 10 Cybersecurity Trends in 2024| Be Ready!Cybersecurity involves the implementation of measures to protect networks and devices from external threats. The rising focus on security…Apr 6, 2024Apr 6, 2024
5 Open-source Threat Intelligence Tools | I wish I had known beforeHello Everyone!Mar 26, 2024Mar 26, 2024