Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends
Volume 1, Issue , December 2023, Page
Share article
Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN
Volume 1, Issue , December 2023, Page
Share article
Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review
Volume 1, Issue , December 2023, Page
Share article
Bilinear pairing-based access control and key agreement scheme for smart transportation
Volume 1, Issue , December 2023, Page
Share article
Cyber security: State of the art, challenges and future directions
Volume 2, Issue , January 2024, Page
Share article
Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory
Volume 1, Issue , December 2023, Page
Share article
An efficient IoT group association and data sharing mechanism in edge computing paradigm
Volume 1, Issue , December 2023, Page
Share article
Efficient time-oriented latency-based secure data encryption for cloud storage
Volume 2, Issue , January 2024, Page
Share article
Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments
Volume 2, Issue , January 2024, Page
Share article
A decentralised KYC based approach for microfinance using blockchain technology
Volume 1, Issue , December 2023, Page
Share article
Quantum communication with RLP quantum resistant cryptography in industrial manufacturing
Volume 1, Issue , December 2023, Page
Share article
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing
Volume 1, Issue , December 2023, Page
Share article
An advanced and secure framework for conducting online examination using blockchain method
Volume 1, Issue , December 2023, Page
Share article
Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security
Volume 2, Issue , January 2024, Page
Share article
Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System
Volume 1, Issue , December 2023, Page
Share article
Edge intelligent collaborative privacy protection solution for smart medical
Volume 1, Issue , December 2023, Page
Share article
A review of deep learning models to detect malware in Android applications
Volume 1, Issue , December 2023, Page
Share article
Secure session key pairing and a lightweight key authentication scheme for liable drone services
Volume 1, Issue , December 2023, Page
Share article
Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system
Volume 1, Issue , December 2023, Page
Share article
Authentication, access control and scalability models in Internet of Things Security–A review
Volume 3, Issue , December 2025, Page
Share article
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact
Volume 2, Issue , January 2024, Page
Share article
PPT-LBS: Privacy-preserving top-k query scheme for outsourced data of location-based services
Volume 1, Issue , December 2023, Page
Share article
A novel dual optimized IDS to detect DDoS attack in SDN using hyper tuned RFE and deep grid network
Volume 2, Issue , January 2024, Page
Share article
A blockchain-based anonymous reporting system with no central authority: Architecture and protocol
Volume 2, Issue , January 2024, Page
Share article
A three-factor mutual authentication scheme for telecare medical information system based on ECC
Volume 2, Issue , January 2024, Page
Share article