Publications

TitleAbstractLinkDate
Securing Medical Datasets using Blockchain TechnologyThe study proposed a model that would unites almost all of the leading healthcare providers, by combining all Electronic Health Record (EHR) system including hospitals, clinics, and specialized Laboratories as well. MedBloc, a blockchain-based safe EHR system that offers accessibility, safety, and protection is described. It allows both patients and healthcare professionals to view and exchange medical records, by extracting important ideas that can be used to create multiple blockchain systems and vulnerability scanning that address security flaws. This article also presents blockchain vulnerability management options by analyzing some assaults upon blockchain, including hashing, connectivity, smart contract and privacy breach cyberattacks. It has been proven difficult as a result of trustworthy attack analysis techniques. Therefore, we explore the blockchain's user privacy in this paper and consider potential fixes. We systematically divide the three kinds of blockchain attack strategies, then mentioned the associated attack and defense techniques that rely on such divisions.ViewDecember 31, 2022
Spear-Phishing campaigns: Link Vulnerability leads to phishing attacks, Spear-Phishing electronic/UAV communication-scam targetedIn this paper we have studied and found up to date approaches to spear phishing attacks and their preventative measures. The paper also demonstrates the steps to set up and run successful phishing campaign and the results astonishingly shows that even only personality-targeted messaging can alter the response to phishing attacks. As a result of learning the facts, the paper suggests that users should seek to improve their security awareness by becoming familiar with the warning signs of phishing attacks. Moreover, more often in Unmanned Aerial Vehicles (UAV) or drones (which are now being used in various domains including military operations, monitoring, etc.), the resources are deployed as web services which makes them vulnerable to phishing activities. A data mining technique is also suggested as a tool for the detection of phishing attacks in UAVs.ViewNovember 29, 2021

Guarding against the unknown like a Hokage