Articles

  • Dec 19, 2024 | mdpi.com | Mushtaq Ahmad

    2. Literature ReviewThe first author to analyze the effects of oil rents on the economy was Gelb []. His work was titled Oil Windfalls: Blessing or Curse. Gelb employed descriptive statistics in the analysis and showed that mining economies suffered more from a decline in domestic investment efficiency than non-mineral economies during the boom years of 1971–1983. Warhurst and Auty [] analyzed the results of industrial policy in these nations, building on the work of Gelb [].

  • Nov 22, 2024 | mdpi.com | Mushtaq Mir |Ghanshyam Tejani |Mushtaq Ahmad |Abrar Yaqoob

    All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess.

  • Oct 21, 2024 | community.nasscom.in | Mushtaq Ahmad

    Cybersecurity is now a battleground not just for humans, but for AI systems, with Generative AI (GenAI) playing a dual role in both strengthening defenses and enabling new types of cyberattacks. On one hand, GenAI is revolutionizing cybersecurity by improving threat detection, automating responses, and bolstering defensive mechanisms. On the other hand, hackers are leveraging the same technology to develop more sophisticated, evasive techniques, penetrating even the most secure systems.

  • Oct 21, 2024 | cioandleader.com | Mushtaq Ahmad

    Cybersecurity is now a battleground not just for humans, but for AI systems, with Generative AI (GenAI) playing a dual role in both strengthening defenses and enabling new types of cyberattacks. On one hand, GenAI is revolutionizing cybersecurity by improving threat detection, automating responses, and bolstering defensive mechanisms. On the other hand, hackers are leveraging the same technology to develop more sophisticated, evasive techniques, penetrating even the most secure systems.

  • Apr 27, 2024 | mdpi.com | Mushtaq Ahmad |Xiaofei Zhang |Xin Lai |Farman Ali

    All articles published by MDPI are made immediately available worldwide under an open access license. No specialpermission is required to reuse all or part of the article published by MDPI, including figures and tables. Forarticles published under an open access Creative Common CC BY license, any part of the article may be reused withoutpermission provided that the original article is clearly cited. For more information, please refer tohttps://www.mdpi.com/openaccess.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →