Papers by Abhishek P Manjunath

JOURNAL OF INTERNATIONAL CRISIS AND RISK COMMUNICATION RESEARCH (JICRCR), 2025
International data sharing has become crucial for today's business world, but old ways of doing t... more International data sharing has become crucial for today's business world, but old ways of doing this have big security and rule-following problems. Companies have trouble with bad tracking systems, poor data protection when processing information, and problems following different laws in various countries. This new system puts together blockchain and safe computing areas to fix these troubles. Blockchain makes records that nobody can change, and safe computing spots keep private information protected when it gets processed. Automatic checking systems make sure data moves follow rules like GDPR and HIPAA without needing people to watch all the time. The setup deals with conflicting laws between countries by spotting problems and either stopping data moves or sending them through places that follow the rules. Medical and money companies get lots of help because they have tough rules to follow. The system can handle more data and users while meeting local laws in different places. Tests prove it works much better than old ways, with quicker processing and better safety. Companies can use this to grow worldwide while following different international data protection rules. The solution helps organizations that need to share secret information across borders while meeting tough legal requirements and keeping their operations running smoothly.

International Journal of Computational andExperimental Science and ENgineering(IJCESEN), 2025
Modern digital infrastructure confronts escalating cyber threats while conventional processing sy... more Modern digital infrastructure confronts escalating cyber threats while conventional processing systems demonstrate inadequate performance in addressing real-time security challenges across enterprise networks. Brain-inspired computational frameworks offer revolutionary alternatives by mimicking biological neural mechanisms to overcome fundamental limitations present in traditional cybersecurity architectures. Temporal spike-based processing networks deliver biologically authentic methods for examining time-dependent characteristics within data transmission flows, facilitating enhanced recognition of coordinated service disruption attacks, persistent infiltration campaigns, and irregular network behaviors. Activity-triggered computational models substantially minimize energy consumption while preserving microsecond response capabilities crucial for protecting organizational network assets. Fusion with access governance protocols strengthens identity verification procedures and permission management through simultaneous evaluation of diverse communication channels. Large-scale neural processing hardware exhibits remarkable computational performance with processing elements functioning at elevated operational frequencies while maintaining reduced power utilization levels. Timingdependent synaptic adaptation enables continuous learning functionality, permitting automatic calibration of detection variables according to changing network environments. Power conservation benefits prove especially significant for extensive installations where electrical consumption directly influences operating expenses and ecological responsibility. Deployment obstacles encompass equipment procurement limitations, architectural compatibility issues, and coordination requirements with established technological infrastructure. Anticipated developments include protocol unification projects, enhanced machine learning techniques, and thorough assessment platforms designed to expedite progression from conceptual designs to functional cybersecurity implementations.
Uploads
Papers by Abhishek P Manjunath