Author:Wajid Kumar

Publications
EasyChair Preprint 12712
EasyChair Preprint 12711
EasyChair Preprint 12710
EasyChair Preprint 12419
EasyChair Preprint 12259
EasyChair Preprint 12190
EasyChair Preprint 12093
EasyChair Preprint 12092
EasyChair Preprint 12090
EasyChair Preprint 12044
EasyChair Preprint 12043
EasyChair Preprint 12028

Keyphrases

Accountability, Artificial Intelligence4, Authentication, Authorization., Big Data environments, Biomedical Engineering, Business Analytics, case studies, code review, countermeasures, Cyber Resilience, Cyber Threats, Cybersecurity3, data-driven decision making, Disease Diagnosis, dynamic decision making, Employee Management, Encryption3, error handling, Ethical AI, Ethical Considerations, ethical frameworks2, ethics, evolution, exploit mitigation, Future Trajectories, Governance, impacts2, Incident Response2, Inclusivity, informed decision making, input validation, integrated strategies, interdisciplinary, interdisciplinary discourse, Internet of Things, IoT, IT supply chain2, machine learning4, Malware, medical devices2, Mergers and Acquisitions2, mitigation strategies, neural networks, Organizational Effectiveness, patient care, penetration testing, performance prediction, Personalized Healthcare, Predictive Analytics, Present Realities, Ransomware2, Resilience, Responsible Development, responsible technology, Sales, Sales Optimization, SAP Supply Chain, secure coding2, secure communication, security awareness, societal impact, software security2, stakeholder perspectives, Strategic Execution, Strategic Insights, Supply Chain Efficiency, synergy, technological landscape, threat landscape, Threat Modeling2, transparency, treatment optimization, trends, vulnerability mitigation, vulnerability prevention.