Prof. Elisabetta Zuanelli
Department of management-computing sciences School of Economy and Finance, University of Rome "Tor Vergata", Italy
Interests: Contrastive analysis: phonology and phonetics; error analysis of communication; theories of communication; communication skills; educational sociolinguistics; multilingual minority languages; pragmalinguistics; institutional public communication; normative communication; digital communication; semiotics of interface design, technology architectures, elearning; intelligent platforms and digital services; search engines development research; multidisciplinary approaches to e-content / IT infomation security; AI modelling; iconic syntax and indexing; cybersecurity ontologies.
Dr. Jupeth Toriano Pentang
College of Education, Western Philippines University, Philippines
Interests: DATA SCIENCE AND ANALYTICS PROJECT MANAGEMENT
Dr. Rashi Saxena
Computer Science & Engg. Dept, KL University, India
Interests: Cloud computing, Blockchain, Cybersecurity
A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In today’s connected world, everyone benefits from advanced cyber security programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies.
Potential topics include but are not limited to the following:
Cloud security posture management, The importance of network security, The importance of end-user education, Cloud security posture management, An overview of cyber security’s research areas, Security breaches of remote working, Cybersecurity standards for automotive, Privacy settings of social media accounts, The influence of remote work on a firm’s, Big data and the rise of internet crimes, Compare and analyze different hacking collectives, Evaluating how antimalware operate to prevent cyber attacks, The biggest cyber security threats in the world today, Importance of software updates in cyber security, Demystifying white and black hat hackers, Analyzing the most difficult part in cyber security administration, Anomalous communion detection systems, Cyber security and blockchain, Reverse engineering.