About
5
Publications
107
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
0
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (5)
This article examines the critical challenges and solutions in protecting elderly users from financial fraud in the digital age. The article analyzes the unique vulnerabilities of elderly populations to cyber threats, particularly in the context of digital banking and online financial services. The article investigates the effectiveness of various...
This article explores the transformative impact of artificial intelligence on modern cybersecurity operations. The article examines how AI-driven systems have revolutionized threat detection, anomaly identification, and incident response capabilities while significantly improving operational efficiency in security operations centers. The article in...
The implementation of Zero Trust Architecture (ZTA) in protecting America's critical infrastructure represents a fundamental shift in cybersecurity strategy. This article examines the evolution of cyber threats targeting U.S. infrastructure and the corresponding advancement of defense mechanisms. The article explores major security incidents, inclu...
This article examines the evolution and implementation of modern security products and operations in enterprise environments. The article investigates the intricate relationships between security operations centers (SOCs), complex systems Deepak Bhaskaran https://iaeme.com/Home/journal/IJCET 1769 editor@iaeme.com architecture, and cloud security im...
The implementation of Zero Trust Architecture (ZTA) in protecting America's critical infrastructure represents a fundamental shift in cybersecurity strategy. This article examines the evolution of cyber threats targeting U.S. infrastructure and the corresponding advancement of defense mechanisms. The article explores major security incidents, inclu...