- Advanced Malware Detection Techniques
- Digital and Cyber Forensics
- Network Security and Intrusion Detection
- Software System Performance and Reliability
- Digital Media Forensic Detection
- Blockchain Technology Applications and Security
- Intelligent Tutoring Systems and Adaptive Learning
- Molecular Communication and Nanonetworks
- Distributed and Parallel Computing Systems
- Topic Modeling
- Energy Efficient Wireless Sensor Networks
- Cloud Computing and Resource Management
- Gear and Bearing Dynamics Analysis
- Energy Harvesting in Wireless Networks
- Advanced Computing and Algorithms
- Multimodal Machine Learning Applications
- Motor Control and Adaptation
- Fatigue and fracture mechanics
- Educational Technology and Assessment
- Ferroelectric and Negative Capacitance Devices
- Spam and Phishing Detection
- Earthquake Detection and Analysis
- Cloud Data Security Solutions
- Cybercrime and Law Enforcement Studies
- Semantic Web and Ontologies
University of Pretoria
2018-2025
Tennessee Cancer Specialists
2023
Siksha O Anusandhan University
2022
General Motors (United States)
2011
General Motors (Poland)
2000
Voice cloning methods have been used in a range of ways, from customized speech interfaces for marketing to video games. Current voice systems are smart enough learn characteristics few samples and produce perceptually unrecognizable speech. These pose new protection privacy risks voice-driven interfaces. Fake audio has malicious purposes is difficult classify what real fake during digital forensic investigation. This paper reviews the issue deep-fake classification evaluates current...
Securing digital evidence is a key factor that contributes to admissibility during forensic investigations, particularly in establishing the chain of custody evidence. However, not enough done ensure environment and access are secure. Attackers can go extreme lengths cover up their tracks, which serious concern forensics – readiness. If an attacker gains location where stored, they could easily alter (if remove it altogether). Even though integrity checks be performed sound, collected may...
Energy harvesting wireless sensor networks (EH-WSNs) appear as the fundamental backbone of research that attempts to expand lifespan and efficiency positioned in resource-constrained environments. This review paper provides a in-depth examination latest developments this area, highlighting important components comprising routing protocols, energy management plans, cognitive radio applications, physical layer security (PLS), EH approaches. Across well-ordered investigation these features,...
Energy harvesting wireless sensor networks (EH-WSNs) appear as the fundamental backbone of research that attempts to expand lifespan and efficiency positioned in resource-constrained environments. This review paper provides an in-depth examination latest developments this area, highlighting important components comprising routing protocols, energy management plans, cognitive radio applications, physical layer security (PLS), EH approaches. Across a well-ordered investigation these features,...
Ransomware attacks have increased significantly in recent years, causing great destruction and damage to critical systems business operations. Attackers are unfailingly finding innovative ways bypass detection mechanisms, which encouraged the adoption of artificial intelligence. However, most research summarizes general features AI induces many false positives, as behavior ransomware constantly differs detection. Focusing on key indicating becomes vital this guides investigator inner...
The extraction of digital evidence from storage media is a growing concern in forensics, due to the time and space complexity acquiring, preserving analysing evidence. Microsoft Windows Registry an example potential source that contains database evidential information about both system users. However, vastness Registry, it difficult manually sift through this extract Furthermore, sifting provides room for human error, which could invalidate entire forensic investigation. This time-consuming...
The validity and integrity of digital evidence the chain custody are crucial to all forensic investigations. All new access logs original should be logged in a document called ‘chain custody’. This shows timeline any piece from time it was recorded until end investigation. In traditional investigation, trusted parties, such as an investigator, allowed follow strict process when dealing with data. These parties have capability alter data making inadmissible court law. Alternatively, these may...
In recent years, there has been a substantial surge in ransomware attacks, wreaking havoc on both organizations and individuals. These driven by the lure of profits, particularly with widespread use cryptocurrencies, have prompted attackers to continuously develop innovative evasion techniques obfuscation tactics avoid detection. Ransomware, employing seemingly benign functions such as encryption file-locking, poses formidable challenge for detection it evolves beyond traditional...
The growing sophistication of malware has resulted in diverse challenges, especially among security researchers who are expected to develop mechanisms thwart these malicious attacks. While have turned machine learning combat this surge attacks and enhance detection prevention methods, they often encounter limitations when it comes sourcing binaries. This limitation places the burden on create context-specific datasets mechanisms, a time-consuming intricate process that involves series...
Mayur Patidar, Prayushi Faldu, Avinash Singh, Lovekesh Vig, Indrajit Bhattacharya, Mausam -. Proceedings of the 61st Annual Meeting Association for Computational Linguistics (Volume 1: Long Papers). 2023.
In order to boost the fuel economy of their vehicles, automotive OEMs and suppliers have been investigating a range options from alternate vehicle propulsion systems down optimized component level technologies. A rear axle differential with hypoid gear set is one least efficient drive train components, as such, provides unique opportunities for improvements. It has therefore attracted significant attention researchers reduce power losses. Both loaded unload losses studied before found vary...
Cryptocurrency has been one of the tools that originated from blockchain technology used in financial world and have a topic debate among several diasporas concerned with money markets.It is known cryptocurrencies such as Bitcoin, Ethereum etc., are demand for transactions securing purposes illustrate need utility cryptocurrencies.Cryptocurrencies product insecurity instability markets; however, measurement pricing cryptocurrency itself based on perception people, which makes it highly...
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
Abstract It has long been recognized that the fatigue life of a component can be divided into crack initiation phase and propagation phase, but researchers have typically ignored one or other in their analytical models. Even stress-life method prediction, which implicitly includes both phases, no distinction is made between phases. In this paper methodology for generating S-N curves will outlined. shown components like gears, phases represent significant portions total life. also gear...
Software-Defined Networking (SDN) is an evolutionary networking paradigm that offers simplified and agile network configuration management capabilities. However, embracing this new futuristic requires the understanding of Digital Forensics (DF) limitations it presents. Studies show dynamism SDN architecture impedes preservation Potential Evidence (PDE) during a Forensic Readiness (DFR) process. Therefore, identification acquisition viable PDE in platforms largely depends on thorough issues...