Ms | Sharmila | Ghosh | National Institute of Technology Agartala | India | Information Hiding and Steganography | Cybersecurity/ Image Steganography | Best Researcher Award |
Assoc Prof Dr | Abdullahi | Arabo | University of the West of England | United Kingdom | Malware Analysis and Detection | Cyber Security | Best Researcher Award |
Mrs | Sathiya | R | Thangavelu Engineering College | India | Intrusion Detection and Prevention | Software Testing,Cloud Computing,Computer Networks | Best Researcher Award |
Mr | Elwin | Masih | Sheffield Hallam University, Sheffield, England | United Kingdom | Others | Education and Training | Best Researcher Award |
Assoc Prof Dr | Anand | Sharma | Mody University of Science and Technology, Lakshmangarh | India | Cybersecurity and Cryptography Policies and Regulations | Quantum Cryptography | Best Researcher Award |
Assist Prof Dr | Kaan | Koçali | Istanbul Gelisim University | Turkey | Human Factors in Cybersecurity and Cryptography. | Social Policy | Best Researcher Award |
Prof | Andrei | Sukhov | Samara National Research University | Russia | Intrusion Detection and Prevention | Intrusion detection thresholds | Best Research Paper in Cybersecurity |
Mr | mullangi | Vinod kumar | Chandigarh college of engineering and technology | India | Others | Engineering | Best Researcher Award |
Ms | Sabiha | Sharmin | Bangladesh University of Professionals | Bangladesh | Others | Plasmonics | Best Researcher Award |
Dr | Rajorshi | Biswas | Penn State Berks | United States | Intrusion Detection and Prevention | Link flooding attack | Best Researcher Award |
Ms | Katarzyna | Ragin-Skorecka | Poznan University of Technology | Poland | Others | Process analysis | Best Researcher Award |
Dr | Samira | Karimaei | Tehran university of Medical Sciences | Iran | Intrusion Detection and Prevention | microbiology | Best Researcher Award |
Mrs | Jothimani | S | Bannari amman institute of technology | India | Others | Diagonestics | Best Researcher Award |
Dr | SAMIULLA | ITOO | Jamia Millia Islamia | India | Cryptographic Algorithms and Protocols | Design and Analysis of Authentication Protocols Using Cryptographic Techniques | Best Researcher Award |
Dr | Mohammad Hassan | Nazari | Niroo Research Institute | Iran | Cyber Threat Intelligence and Analysis | Analyzing effective external interventions/Cybersecurity/ | Best Researcher Award |
Dr | JING | LI | University Technology Malaysia | China | Cyber Threat Intelligence and Analysis | Machine learning and Deep Learning for Cybersecurity | Best Paper Award |
Assoc Prof Dr | kassem | danach | Department of Information Technology and Management Systems, Faculty of Business Administration, Al Maaref University | Lebanon | Others | Machine Learning | Excellence in Research |
Dr | Hongwei | Zhu | Tsinghua Shenzhen International Graduate School, Tsinghua University | China | Cryptographic Implementations and Side-Channel Attacks | Boolean function; linear codes | Best Researcher Award |
Assist Prof Dr | Samsul | Huda | Okayama University | Japan | Intrusion Detection and Prevention | IDS in IoT networks | Best Researcher Award |
Ms | Indu | Radhakrishnan | PES University | India | Cryptography for Emerging Technologies (e.g., blockchain, IoT) | Cryptography for IoT | Best Researcher Award |