Most Cited Articles

Open access

ISSN: 2772-9184

Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends

Share article

Cyber security: State of the art, challenges and future directions

Share article

Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

Share article

Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review

Share article

An efficient IoT group association and data sharing mechanism in edge computing paradigm

Share article

Bilinear pairing-based access control and key agreement scheme for smart transportation

Share article

Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory

Share article

Efficient time-oriented latency-based secure data encryption for cloud storage

Share article

Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments

Share article

Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing

Share article

Quantum communication with RLP quantum resistant cryptography in industrial manufacturing

Share article

A decentralised KYC based approach for microfinance using blockchain technology

Share article

An advanced and secure framework for conducting online examination using blockchain method

Share article

Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System

Share article

Edge intelligent collaborative privacy protection solution for smart medical

Share article

A review of deep learning models to detect malware in Android applications

Share article

Secure session key pairing and a lightweight key authentication scheme for liable drone services

Share article

Mutual information based logistic regression for phishing URL detection

Share article

Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system

Share article

Authentication, access control and scalability models in Internet of Things Security–A review

Share article

A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact

Share article

A three-factor mutual authentication scheme for telecare medical information system based on ECC

Share article

Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings

Share article

An application for predicting phishing attacks: A case of implementing a support vector machine learning model

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.