Most Cited Articles

Open access

ISSN: 2772-9184

Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends

Share article

Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

Share article

Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review

Share article

Bilinear pairing-based access control and key agreement scheme for smart transportation

Share article

Cyber security: State of the art, challenges and future directions

Share article

Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory

Share article

An efficient IoT group association and data sharing mechanism in edge computing paradigm

Share article

Efficient time-oriented latency-based secure data encryption for cloud storage

Share article

Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments

Share article

A decentralised KYC based approach for microfinance using blockchain technology

Share article

Quantum communication with RLP quantum resistant cryptography in industrial manufacturing

Share article

Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing

Share article

An advanced and secure framework for conducting online examination using blockchain method

Share article

Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System

Share article

Edge intelligent collaborative privacy protection solution for smart medical

Share article

A review of deep learning models to detect malware in Android applications

Share article

Secure session key pairing and a lightweight key authentication scheme for liable drone services

Share article

Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system

Share article

Authentication, access control and scalability models in Internet of Things Security–A review

Share article

A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact

Share article

PPT-LBS: Privacy-preserving top-k query scheme for outsourced data of location-based services

Share article

A novel dual optimized IDS to detect DDoS attack in SDN using hyper tuned RFE and deep grid network

Share article

A blockchain-based anonymous reporting system with no central authority: Architecture and protocol

Share article

A three-factor mutual authentication scheme for telecare medical information system based on ECC

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.