Blog

2022 ISIF Asia Grants now open for applications


ISIF Asia is now accepting applications for the 2022 funding cycle. ISIF Asia empowers organizations across the Asia Pacific region to research, design, and implement Internet-based solutions to solve Internet development challenges that support community development and growth. Since 2008, ISIF Asia has supported 99 grants and 29 awards, allocating over USD 5.4 million to 128 innovative initiatives across 27 economies. Applications are open to public and private sector organizations, academia, non-profits, … Continue reading 2022 ISIF Asia Grants now open for applications

2021 ISIF Asia grant recipients announced


ISIF Asia has released its full list of 2021 grantees. Find out more about this record list of 22 projects.

Report available! Modelling and identifying IP address space fragmentation pressure points


Despite exhaustion of the IPv4 address space commencing in 2011, the Internet has largely not transitioned to IPv6, and in fact the rate of IPv6 diffusion has recently begun to slow down (Huston, 2018).  The IPv6 transition is expected to take decades and hence problems stemming from issues the lack of scalability of IPv4 will … Continue reading Report available! Modelling and identifying IP address space fragmentation pressure points

Report available! Collaborative Honeynet Threat Sharing Platform


With the continuous rise of cyber security threats, monitoring security potential threats and attacks become essential to plan for cyber defense. Honeypot, a decoy system designed to lure attackers, has been used to track and learn attacker’s behavior. Collecting attacker’s interactions with honeypot at different locations inside different organization’s premises provide useful and more complete … Continue reading Report available! Collaborative Honeynet Threat Sharing Platform

Report available! Telemetering the telltale signs of power issues of wireless internet relays


The TellTale project was conceived with aim of addressing the problem of measurement and projection of the power uptime duration of wireless internet relays. In rural areas and in areas where such projections are not available, operators often fail to address downtimes in a timely manner, thereby increasing the number and duration of downtimes and/or … Continue reading Report available! Telemetering the telltale signs of power issues of wireless internet relays

Report Available! Experiment and improve reinforcement learning algorithms to enhance anomalous network behaviour detection


Cybersecurity is a significant research area because all of the operations based on government, military, commercial, financial and civilians gather, process, transfer and store tremendous volume of data on computers and others. Cyber-attacks have imposed increasing threats and damages on our modern society at all levels. Network Intrusion Detection System (NIDS) is one of the major … Continue reading Report Available! Experiment and improve reinforcement learning algorithms to enhance anomalous network behaviour detection