default search action
Security and Privacy, Volume 7
Volume 7, Number 1, January/February 2024
Survey articles
- Archan Dhadhania, Jitendra Bhatia, Rachana Mehta, Sudeep Tanwar, Ravi Sharma, Amit Verma:
Unleashing the power of SDN and GNN for network anomaly detection: State-of-the-art, challenges, and future directions. - Yassine Mekdad, Ahmet Aris, Abbas Acar, Mauro Conti, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes.
Research articles
- Ankita Mishra, Mohammad S. Obaidat, Dheerendra Mishra:
Privacy preserving content distribution framework for multidistributor DRM systems. - Mohammed Rauf Ali Khan:
Understanding impacts of a ransomware on medical and health facilities by utilizing LockBit as a case study. - Indu Kumari, Pranav Kumar Singh, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, Danda B. Rawat:
RFPM: A RSU-aided framework for pseudonym management to preserve location privacy in IoV. - B. S. Sharmila, Rohini Nagapadma:
P-DNN: Parallel DNN based IDS framework for the detection of IoT vulnerabilities. - Zeinab Zoghi, Gürsel Serpen:
UNSW-NB15 computer security dataset: Analysis through visualization. - Dominik Schrahe, Thomas Städter:
Privacy preserving vaccinating- and testing-pass for the European Union. - Martijn Dekker, Lampis Alevizos:
A threat-intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision-making. - Shyam Saurabh, Kishore Sinha:
Optimal key pre-distribution schemes from affine resolvable and partially affine resolvable designs. - Ravi Kumar, Samayveer Singh, Deepti Singh, Mohit Kumar, Sukhpal Singh Gill:
A robust and secure user authentication scheme based on multifactor and multi-gateway in IoT enabled sensor networks. - Md. Azharul Islam, Sanjay Madria:
Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation. - Subhas Barman, Samiran Chattopadhyay, Debasis Samanta:
Toward design a secure protocol for updating remotely stored credentials of a crypto-biometric framework for multi-server environment. - Shweta Sankhwar, Rupali Ahuja, Tanya Choubey, Priyanshi Jain, Tanusha Jain, Muskan Verma:
Cybercrime in India: An analysis of crime against women in ever expanding digital space. - Xiaole Su, Yuanchao Hu, Wei Liu, Zhipeng Jiang, Chan Qiu, Jie Xiong, Ju Sun:
A blockchain-based smart contract model for secured energy trading management in smart microgrids.
Volume 7, Number 2, March/April 2024
Survey papers
- Parikshith Nayaka Sheetakallu Krishnaiah, Dayanand Lal Narayan, Kartick Sutradhar:
A survey on secure metadata of agile software development process using blockchain technology. - Hela Makina, Asma Ben Letaifa, Abderrezak Rachedi:
Survey on security and privacy in Internet of Things-based eHealth applications: Challenges, architectures, and future directions. - Abhishek Bisht, Ashok Kumar Das, Debasis Giri:
Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey.
Research articles
- Harshil Sanghvi, Rushir Bhavsar, Vini Hundlani, Lata Gohil, Tarjni Vyas, Anuja Nair, Shivani Desai, Nilesh Kumar Jadav, Sudeep Tanwar, Ravi Sharma, Nagendar Yamsani:
MetaHate: AI-based hate speech detection for secured online gaming in metaverse using blockchain. - Mohammed Riyadh Abdmeziem, Hiba Akli, Rima Zourane:
Nodes selection review for federated learning in the blockchain-based internet of things. - Himanshu Vadher, Pal Patel, Anuja Nair, Tarjni Vyas, Shivani Desai, Lata Gohil, Sudeep Tanwar, Deepak Garg, Anupam Singh:
EEG-based biometric authentication system using convolutional neural network for military applications. - Sandeep Sharma, Prachi Ahlawat, Kavita Khanna:
DeepMDFC: A deep learning based android malware detection and family classification method. - Deepa Rani, Rajeev Kumar, Naveen Chauhan:
A secure framework for IoT-based healthcare using blockchain and IPFS. - Vankamamidi Srinivasa Naresh, Sivaranjani Reddi:
An identity-based secure VANET communication system. - Heba A. Hassan, Ezz El-Din Hemdan, Walid El-Shafai, Mona Shokair, Fathi E. Abd El-Samie:
Detection of attacks on software defined networks using machine learning techniques and imbalanced data handling methods. - Umesh Bodkhe, Sudeep Tanwar:
V2XCom: Lightweight and secure message dissemination scheme for Internet of vehicles. - Vijay Karnatak, Amit Kumar Mishra, Neha Tripathi, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das:
A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications. - Alay Patel, Devam Patel, Riya Kakkar, Parita Rajiv Oza, Smita Agrawal, Sudeep Tanwar, Ravi Sharma, Nagendar Yamsani:
Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities. - N. Joychandra Singh, Nazrul Hoque, Kh Robindro Singh, Dhruba K. Bhattacharyya:
Botnet-based IoT network traffic analysis using deep learning. - Sangeeta Gupta, Premkumar Chithaluru, May El Barachi, Manoj Kumar:
Secure data access using blockchain technology through IoT cloud and fabric environment. - Mubeen Javed, Muhammad Arslan Akram, Adnan Noor Mian, Saru Kumari:
On the security of a novel privacy-preserving authentication scheme for V2G networks. - Grishan Pradhan, Babu R. Dawadi, Abiral Chaulagain, Anish Lal Joshi, Prajal Govinda Vaidya:
Chaos and DNA coding technique for image cryptography. - Upendra Verma, Mayank Sohani:
An efficient lightweight authentication scheme for dew-assisted IoT networks. - Pawan Kumar, Sukhdip Singh:
Enhancing android application security: A novel approach using DroidXGB for malware detection based on permission analysis. - Anusha Vangala, Ashok Kumar Das, Neeraj Kumar, Pandi Vijayakumar, Marimuthu Karuppiah, Youngho Park:
Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service.
Volume 7, Number 3, May/June 2024
Research articles
- Habib Esmaeelzadeh Rostam, Homayun Motameni, Rasul Enayatifar:
Privacy-preserving in the smart healthcare system using steganography and chaotic functions based on DNA. - Jegadeesan Subramani, Maria Azees, Arun Sekar Rajasekaran, Jaime Lloret:
Physically secure and privacy-preserving blockchain enabled authentication scheme for internet of drones. - Zhongming Huang, Feng Wang, Chin-Chen Chang, Xiuqiang Chen:
A new authentication scheme for dynamic charging system of electric vehicles in fog environment. - Harini Bilakanti, Sreevani Pasam, Varshini Palakollu, Sairam Utukuru:
Anomaly detection in IoT environment using machine learning. - Ruiqi Li, Fupeng Li, Peng Xu, Shuiting Du, Bingling Gu:
Location privacy protection of nodes in the perception layer of the Internet of things based on Radio Frequency Identification location aware algorithm. - Kunal Demla, Ashima Anand:
MieWC: Medical image encryption using wavelet transform and multiple chaotic maps. - P. P. Hema, Anchare V. Babu:
Full-duplex jamming for physical layer security improvement in NOMA-enabled overlay cognitive radio networks. - V. V. L. Divakar Allavarpu, Vankamamidi Srinivasa Naresh, A. Krishna Mohan:
Privacy-preserving credit risk analysis based on homomorphic encryption aware logistic regression in the cloud. - Keiichiro Oishi, Yuichi Sei, J. Andrew, Yasuyuki Tahara, Akihiko Ohsuga:
Algorithm to satisfy l-diversity by combining dummy records and grouping. - Osamah Ibrahim Khalaf, Ashokkumar S. R, Sameer Algburi, Anupallavi S, Dhanasekaran Selvaraj, Mhd Saeed Sharif, Wael Elmedany:
Federated learning with hybrid differential privacy for secure and reliable cross-IoT platform knowledge sharing. - Priyabrata Dash, Monalisa Sarma, Debasis Samanta:
Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications. - Ikram Ud Din, Wajahat Ali, Ahmad Almogren, Iehab Al Rassan, Sherali Zeadally:
Using smart grid infrastructure for authentication and data management in Internet of Medical Things.
Survey papers
- Isha Pali, Ruhul Amin, Mohammad Abdussami:
Autonomous vehicle security: Current survey and future research challenges. - Animesh Kumar, Sandip Dutta, Prashant Pranav:
Analysis of SQL injection attacks in the cloud and in WEB applications.
Volume 7, Number 4, July/Augusust 2024
Research article
- Jigna J. Hathaliya, Sudeep Tanwar:
A systematic survey on security and privacy issues of medicine supply chain: Taxonomy, framework, and research challenges. - Mohammed Ali Qasem, Fursan Thabit, Ozgu Can, Ebrahim Naji, Hoda A. Alkhzaimi, Pritam Rajendra Patil, S. B. Thorat:
Cryptography algorithms for improving the security of cloud-based internet of things. - Shahram Ghahremani, Uyen Trang Nguyen:
Comprehensive evaluation of privacy policies using the contextual integrity framework. - Tapesh Sarsodia, Uma Rathore Bhatt, Raksha Upadhyay, Vijay Bhat:
Hybrid KuFaI: A novel secure key generation algorithm using fast independent component analysis for physical layer security techniques. - Sachin Kumar, Akshit Tyagi, Kadambri Agarwal, Saru Kumari, Chien-Ming Chen:
A trustworthy data collection approach from sensor nodes using trust score of mobile vehicles for smart city. - Sonam Yadav, Vivek Dabra, Pradeep Malik, Saru Kumari:
Flaw and amendment of Dharminder et al.'s authentication protocol for satellite communication. - Asmaa Amer Qasem, Mona Shokair, Fathi E. Abd El-Samie:
Physical-layer security enhancement in wireless sensor networks through artificial noise optimization. - Amith Murthy, Muhammad Rizwan Asghar, Wanqing Tu:
A lightweight Intrusion Detection for Internet of Things-based smart buildings. - Umesh Bodkhe, Sudeep Tanwar:
Secure and lightweight message dissemination framework for internet of vehicles. - Usha Jain:
Secure, light-weight and dynamic PUF-based mutual device authentication mechanism in industrial IoT networks.
Volume 7, Number 5, September/October 2024
Tutorial
- Raut Omprakash Jagannath, Ankit Kumar Jain:
Browser-in-the-middle attacks: A comprehensive analysis and countermeasures.
Survey Paper
- Tamara Finogina, Jordi Cucurull-Juan, Núria Costa:
Selective comparison of verifiable online voting systems. - Mohammed El-Hajj, Taru Itäpelto, Teklit Haftu Gebremariam:
Systematic literature review: Digital twins' role in enhancing security for Industry 4.0 applications. - Hira Rasheed, Rafidah Md Noor, Norjihan Binti Abdul Ghani, Iftikhar Ahmad:
Preserving location-query privacy in location-based services: A review.
Research Article
- Ashutosh Aithekar, Pratik Gupta, Dharminder Chaudhary:
A secure and efficient heterogeneous ID-based signcryption for unmanned aerial vehicular networking system. - Sakhi Bandyopadhyay, Subhadip Mukherjee, Somnath Mukhopadhyay, Sunita Sarkar:
Parallel BFS through pennant data structure with reducer hyper-object based data hiding for 3D mesh images. - Ahmed J. Kadhim, Tayseer S. Atia:
Quantum encryption of healthcare images: Enhancing security and confidentiality in e-health systems. - Vahid Bakhtiary, Amir Masoud Rahmani:
Blockchain integration in big data: Review, vision, and opportunities. - Haiyue Chen, Xiangfu Zhao, Yichen Wang, Zixian Zhen:
SafeCheck: Detecting smart contract vulnerabilities based on static program analysis methods. - Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, Asma Aid:
Malicious clouds coalition management for business processes deployment. - Sabyasachi Samanta, Sudipta Roy, Abhijit Sarkar, Dipak Kumar Jana:
Linguistic response surface methodology approach to measure the quality of nonlinear frame-pixel and bit place-based video steganography. - Ahmed Moumena, Imane Saim Haddache:
Intelligent jamming detection-based robust principal components analysis in communication system for security and defense. - Mahendra Prasad, Pankaj Pal, Sachin Tripathi, Keshav P. Dahal:
AI/ML driven intrusion detection framework for IoT enabled cold storage monitoring system. - Bjorn Oude Roelink, Mohammad El-Hajj, Dipti Kapoor Sarmah:
Systematic review: Comparing zk-SNARK, zk-STARK, and bulletproof protocols for privacy-preserving authentication. - Suhaima Jamal, Hayden Wimmer, Iqbal H. Sarker:
An improved transformer-based model for detecting phishing, spam and ham emails: A large language model approach. - Bhabesh Mali, Pranav Kumar Singh, Nabajyoti Mazumdar:
SAFe-Health: Guarding federated learning-driven smart healthcare with federated defense averaging against data poisoning. - Garima Thakur, Mohammad S. Obaidat, Piyush Sharma, Sunil Prajapat, Pankaj Kumar:
An efficient provably secure authentication and key agreement protocol for satellite communication networks. - Radhika Lama, Sandip Karmakar:
SiSMA-SWMS: Signature-based Secure Monitoring Approach for Smart Waste Monitoring Systems. - Sabra Ben Saad:
A trust distributed learning (D-NWDAF) against poisoning and byzantine attacks in B5G networks. - Dheerendra Mishra, Komal Pursharthi:
Cryptanalysis with improvement on lattice-based authenticated key exchange protocol for mobile satellite communication networks. - Minhaj Khan, Mohd. Haroon:
Ensemble random forest and deep convolutional neural networks in detecting and classifying the multiple intrusions from near real-time cloud datasets. - Rizwan Uz Zaman Wani, Fursan Thabit, Ozgu Can:
Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: A systematic review. - Shi Jin, Yichun Wang, Zhaofeng Guo, Li Yang, Xiaosan Su:
Short message encryption technology of Beidou communication based on SM9. - Zahraa A. Mohammed, Khalid Ali Hussein:
PRC6: Hybrid lightweight cipher for enhanced cloud data security in parallel environment.
Volume 7, Number 6, November/December 2024
Research Article
- Flavien Donkeng Zemo, Sara Bakkali:
Sequential fusion-based defense strategy against sophisticated Byzantine attacks in cognitive IoT networks. - Ankur Gupta, Rajesh Gupta, Keyaba Gohil, Sudeep Tanwar, Deepak Garg:
Blockchain-based decentralized oracle network framework for identity management in metaverse environment. - Monire Norouzi:
A novel Bayesian optimizable ensemble bagged trees model for cryptocurrency fraud prediction approach. - Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil:
Kafka-Shield: Kafka Streams-based distributed detection scheme for IoT traffic-based DDoS attacks. - Jigna J. Hathaliya, Sudeep Tanwar:
Intelligent privacy-preserving data management framework for medicine supply chain system. - Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Ashok Kumar Das:
A secure authentication protocol for remote patient monitoring in an internet-of-medical-things environment. - Supongmen Walling, Sibesh Lodh:
Network intrusion detection system for IoT security using machine learning and statistical based hybrid feature selection. - Yi Wang, Hao Yang, Yiming Zhang, Yitao Zhao, Shaoyang Yin:
Privacy-preserving security monitoring data sharing of new power system based on batch verification ring signature. - Nour Mousa, Farid Shirazi:
A survey analysis of quantum computing adoption and the paradigm of privacy engineering. - Kausthav Pratim Kalita, Debojit Boro, Dhruba Kumar Bhattacharyya:
Designing efficient patient-centric smart contracts for healthcare ecosystems with access control capabilities. - MSVPJ Sathvik, Hirak Mazumdar:
Detection of malicious smart contracts by fine-tuning GPT-3. - Jan Bieniek, Mohamed Rahouti, Kaiqi Xiong, Gabriel Ferreira Araújo:
SecureCare: A blockchain-assisted wearable body area network for secure and scalable IoT healthcare services. - Abdullah Ismetoglu, Yavuz Canbay:
Detection of Covid-19 disease by using privacy-aware artificial intelligence system. - Xinhai Li, Yuanchao Hu, Lingcheng Zeng, Yunzhu An, Jinsong Yang, Xing Xiao:
Blockchain-based federated learning approaches in internet of things applications. - Arpit Raj, Vedant Narayan, Vivek Muskan, Abhilash Sani, Pankaj Sharma, S. S. Sarma:
Modern ransomware: Evolution, methodology, attack model, prevention and mitigation using multi-tiered approach. - Biniyam Ayele Belete, Gelmecha Demissie Jobir, Ram Sewak Singh:
Image encryption algorithm based on a memcapacitor-based hyperchaotic system and DNA coding. - Purushottam Singh, Sandip Dutta, Prashant Pranav:
A modified RC-4 cryptosystems to enhance security by using negative key schedule. - Magnus Sandell:
On the trade-off between rate and reliability for secret key generation in wireless channels. - Ishu Sharma, Aditya Bhardwaj, Keshav Kaushik:
Enhancing agricultural wireless sensor network security through integrated machine learning approaches.
Case Study
- Qawsar Gulzar, Khurram Mustafa:
An analytical survey of cyber-physical systems in water treatment and distribution: Security challenges, intrusion detection, and future directions.
Research Article
- Johanna Herman:
Dark patterns: EU's regulatory efforts. - Sayeda Suaiba Anwar, Asaduzzaman, Iqbal H. Sarker:
A differential privacy aided DeepFed intrusion detection system for IoT applications. - Hongzhou Yue, Zebin Song, Mengli Zhao, Lijia Yang:
Research on privacy leakage of celebrity's ID card number based on real-name authentication.
Survey Article
- Md. Ataullah, Naveen Chauhan:
Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review.
Research Article
- Adi El-Dalahmeh, Moawiah El-Dalahmeh, Mohammad Abdur Razzaque, Jie Li:
Cryptographic methods for secured communication in SDN-based VANETs: A performance analysis. - Balayogi G, K. S. Kuppusamy:
An approach for mitigating cognitive load in password management by integrating QR codes and steganography. - Sumit Kumar, Prachi Ahlawat, Jyoti Sahni:
IoT malware detection using static and dynamic analysis techniques: A systematic literature review. - Zhenyong Yang, Changzhong Gao, Yong Wang, Hailong Meng, Shicong Han:
A lightweight security defense algorithm for multimodal attack blocking in industrial control networks based on momentum enhanced feature graphs.
Survey Article
- S. Rajasoundaran, Sivakumar Sabapathy Arumugam, S. Devaraju, M. Jahir Pasha, Jaime Lloret:
A deep experimental analysis of energy-proficient firewall policies and security practices for resource limited wireless networks.
Research Article
- K. Janani, S. Ramamoorthy:
PIoT-fortifying IoT device identity and data access: A security framework empowered by blockchain. - Max Hashem Eiza, Ta Vinh Thong, Qi Shi, Yue Cao:
Secure semi-automated GDPR compliance service with restrictive fine-grained access control. - Changrong Li, Zhenfu Li:
Trajectory tracking attack for vehicular ad-hoc networks.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.