Network intrusion detection using meta-heuristic feature selection and cost-sensitive learning
In contemporary society, networked computers are playing a pivotal role in dissemination of knowledge and critical data in information systems; ensuring its security has become a challenging task for the network administrators and researchers. Machine ...
A contemporary anti-phishing framework based on visual cryptography and steganography
In new technologies developing tremendously, and with this, the usage of online commodities has also seen a surge with a drastic daily increase in the number of users. Online support has also led to increased online attacks on the user's confidential data,...
Credit card fraud detection using predictive features and machine learning algorithms
CCF can destabilise economies, reduce confidence between customers and banks, and severely affect other people and businesses. The primary objective of banks and businesses is to identify fraudulent transactions with a high level of accuracy and to also ...
Analysis of blockchain based smart contract system to understand its performance in different applications
Smart contract technology plays a significant role in various fields for achieving secure and automated transactions without the interference of third parties. There arise certain issues of security and privacy issue during the transaction with the ...
TRO-CP-ABE: a secure and flexible layer with traceability and easy revocation in ciphertext-policy attribute-based encryption
Attribute-based encryption (ABE) is a very efficient way of authorising users to access confidential data in organisations without public-key validation from external trusted authorities or complex login processes. Ciphertext-policy attribute-based ...
Implementation of Bixby oriented electric vehicle charging station searching service
As the electric vehicle market has significantly grown, the needs to install the charging station infrastructure for electric vehicles (EVs) have also been increased. Therefore, it is required for the efficient searching scheme for the appropriate ...