Revolutionizing National Security: An Analysis of Quantum Computing's Impact on Government and Defense

B Kumar, V Topno, P Banerjee… - 2023 2nd International …, 2023 - ieeexplore.ieee.org
A new paradigm in computing called quantum computing has the potential to change many
industries, including the military and government. The purpose of this study is to examine the …

Elevating urban resilience: Cutting-edge cybersecurity implementations for smart metropolises

B Kumar, M Kumar, R Singh - 2024 Parul International …, 2024 - ieeexplore.ieee.org
In the quickly develo** scene of smart cities, cyber security has turned into a foremost
concern. The joining of innovation and information driven arrangements into metropolitan …

Color-Based Auto-Rickshaw Detection Using Convolutional Neural Networks for Intelligent Transportation Systems

MM Hasan, N Aman, MW Jahan - 2024 2nd International …, 2024 - ieeexplore.ieee.org
The investigation in this paper is centered on a new methodology for improving the
effectiveness of intelligent transportation systems by identifying and distinguishing auto …

Comparative study on applications of cybersecurity tools for Kali Linux operating system

SA Hameed Alazawi, AA Abdulhameed… - AIP Conference …, 2024 - pubs.aip.org
Operating systems are a set of software tools designed to interpret user commands, so that
they can be translated into terms that the host computer can understand. Many operating …

The Ethics of AI and IoT in Healthcare: Navigating Cybersecurity Risks and Ensuring Data Protection

S Sidana, P Chaudhary, A Ticku, N Rathore… - Ethical Dimensions of …, 2025 - igi-global.com
Abstract The integration of Artificial Intelligence (AI) and Internet of Things (IoT) technologies
in healthcare has revolutionized patient care by enabling advanced monitoring …

A Comprehensive Assessment on Fortified Security Protocols: Delving into AES Algorithm, ECC, Blockchain, Cloud Computing Within a Regulatory Landscape

B Kumar, K Singh, P Banerjee, P Kumar… - … Control & Information …, 2024 - ieeexplore.ieee.org
In recent days, there have been a few techniques available on the market that can resolve
the concern for data protection and privacy. One of them is said to be cloud computing. In …

Synergies in the Cybersecurity profession: Exploring the Interplay of Hard Skills, Soft Skills, and Team Organization in Penetration Testing

A Bengtsson, E Sirviö - 2024 - lup.lub.lu.se
This thesis investigates the enhancement of technical tasks in penetration testing through
the integration of soft skills, contrasting them with hard skills within the cybersecurity …