default search action
Security and Privacy, Volume 4
Volume 4, Number 1, January 2021
- Shweta Sankhwar, Dhirendra Pandey, Raees Ahmad Khan, Sachi Nandan Mohanty:
An anti-phishing enterprise environ model using feed-forward backpropagation and Levenberg-Marquardt method. - Saurabh Rana, Dheerendra Mishra:
Cryptanalysis and improvement of biometric based content distribution framework for digital rights management systems. - Ilija Basicevic, Nikola Blazic, Stanislav Ocovaj:
On the use of generalized entropy formulas in detection of denial-of-service attacks. - Oladayo Olufemi Olakanmi, Kehinde Oluwasesan Odeyemi:
A secure and collaborative data aggregation scheme for fine-grained data distribution and management in Internet of Things. - Fei Liu, Hongyan Gao, Ze-Gang Wei:
Research on the game of network security attack-defense confrontation through the optimal defense strategy. - Gang Wang:
Comparative study on different neural networks for network security situation prediction. - Reem Alotaibi, Tahani Alnazzawi, Nermin Hamza:
A new location-based privacy protection algorithm with deep learning.
Volume 4, Number 2, March 2021
- Ben Underwood, Hossein Saiedian:
Mass surveillance: A study of past practices and technologies to predict future directions. - Shubhi Srivastava, Mohit, Arun Kumar, Sudhanshu Kumar Jha, Pratibha Dixit, Shiv Prakash:
Event-driven data alteration detection using block-chain.
- Fatemeh Ghiyamipour:
Secure graphical password based on cued click points using fuzzy logic. - Kanos Matyokurehwa, Norman Rudhumbu, Cross Gombiro, Chiedza Mlambo:
Cybersecurity awareness in Zimbabwean universities: Perspectives from the students. - Suat Mercan, Mumin Cebe, Ramazan Savas Aygün, Kemal Akkaya, Elijah Toussaint, Dominik Danko:
Blockchain-based video forensics and integrity verification framework for wireless Internet-of-Things devices. - Uche C. Agwi, Martins E. Irhebhude, Francisca Nonyelum Ogwueleka:
Video surveillance in examination monitoring. - Yehia Ibrahim Alzoubi, Valmira H. Osmanaj, Ashraf Jaradat, Ahmad Salah Al-Ahmad:
Fog computing security and privacy for the Internet of Thing applications: State-of-the-art. - Mahdi Ajdani, Hamid Reza Ghaffary:
Introduced a new method for enhancement of intrusion detection with random forest and PSO algorithm. - Nissa Mehibel, M'hamed Hamadouche:
Authenticated secret session key using elliptic curve digital signature algorithm.
Volume 4, Number 3, May 2021
- Victor R. Kebande, Nickson M. Karie, Kim-Kwang Raymond Choo, Sadi Alawadi:
Digital forensic readiness intelligence crime repository.
- Ricardo M. Czekster, Charles Morisset, John A. Clark, Sadegh Soudjani, Charalampos Patsios, Peter Davison:
Systematic review of features for co-simulating security incidents in Cyber-Physical Systems.
- Sheunesu M. Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard Adeyemi Ikuesan, Sadi Alawadi:
Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring. - Seyed Meysam Zarei, Reza Fotohi:
Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem. - Pietro Russo, Lorenzo Bracciale, Giuseppe Bianchi:
Dare-to-Share: Collaborative privacy-preserving recommendations with (almost) no crypto. - Gamal Eldin I. Selim, Ezz El-Din Hemdan, Ahmed M. Shehata, Nawal A. El-Fishawy:
An efficient machine learning model for malicious activities recognition in water-based industrial internet of things. - Marriette Katarahweire, Engineer Bainomugisha, Khalid A. Mughal, John Ngubiri:
Form-based security in mobile health data collection systems. - Saeed Banaeian Far, Azadeh Imani Rad:
Distributed auditing protocol for blockchain-based transactions using a distributed signature.
Volume 4, Number 4, July 2021
- Kamrul Faisal:
Balancing between Right to Be Forgotten and Right to Freedom of Expression in Spent Criminal Convictions. - Oladayo Olufemi Olakanmi, Kehinde Oluwasesan Odeyemi:
Throttle: An efficient approach to mitigate distributed denial of service attacks on software-defined networks. - Humza Ahmad, Laszlo Erdodi:
Overview of phishing landscape and homographs in Arabic domain names. - Kamrun Nahar, Asif Qumer Gill, Terry Roach:
Developing an access control management metamodel for secure digital enterprise architecture modeling. - Shivansh Kumar, Ruhul Amin:
Mitigating distributed denial of service attack: Blockchain and software-defined networking based approach, network model with future research challenges.
- Affan Yasin, Rubia Fatima, Lin Liu, Jianmin Wang, Raian Ali, Ziqi Wei:
Understanding and deciphering of social engineering attack scenarios.
Volume 4, Number 5, September 2021
- Shivansh Kumar, Aman Kumar Bharti, Ruhul Amin:
Decentralized secure storage of medical records using Blockchain and IPFS: A comparative analysis with future directions.
- Chukhu Chunka, Rajat Subhra Goswami, Subhasish Banerjee:
An efficient mechanism to generate dynamic keys based on genetic algorithm. - Somia Sahraoui, Azeddine Bilami:
Securing human-to-thing interactions in the Internet of Things with asymmetric and selective mechanism. - Cynara Justine, Rendhir R. Prasad, Ciza Thomas:
Game theoretical analysis of usable security and privacy. - Oladayo Olufemi Olakanmi, Adedamola Dada:
An efficient point-to-point security solution for multihop routing in wireless sensor networks. - Moses Ashawa, Sarah Morris:
Android Permission Classifier: a deep learning algorithmic framework based on protection and threat levels. - Tatyana Stojnic, Dinusha Vatsalan, Nalin A. G. Arachchilage:
Phishing email strategies: Understanding cybercriminals' strategies of crafting phishing emails. - Sandeep Kumar Panda, Gouse Baig Mohammad, Sachi Nandan Mohanty, Sipra Sahoo:
Smart contract-based land registry system to reduce frauds and time delay. - Rui Fu, Xinyu Li:
Malicious attacks on the web and crawling of information data by Python technology.
Volume 4, Number 6, November 2021
- Haotian Wu, Xin Li, Caterina M. Scoglio, Don Gruenbacher:
Security inspection resource allocation in real time using SDN. - Sudip Misra, Sumit Goswami, Chaynika Taneja, Pushpendu Kar:
Heterogeneous polydentate mobile chelating node to detect breach in surveillance sensor network. - Dhaneshwar Mardi, Surbhi Tanwar, Jaydeep Howlader:
Multiparty protocol that usually shuffles. - Ahm Shamsuzzoha, Heli Raappana:
Perspectives of business process ethics in data-driven marketing management. - R. Shashidhara, Nisha Ahuja, M. Lajuvanthi, S. Akhila, Ashok Kumar Das, Joel J. P. C. Rodrigues:
SDN-chain: Privacy-preserving protocol for software defined networks using blockchain. - Zhijun Li, Xuedong Jiang:
Detection and defense of network virus using data mining technology. - Li Yuan:
Prediction of network security situation awareness based on an improved model combined with neural network.
- Aditya Bahl, Aastha Sharma, Muhammad Rizwan Asghar:
Vulnerability disclosure and cybersecurity awareness campaigns on twitter during COVID-19.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.