Any Bluetooth device can be hacked. Know how?
2024
In today's world, Bluetooth technology is integrated into almost every device we use, from wireless headsets, mice, and keyboards to cars and smart home devices. But with the convenience of this technology...
Cyber security: State of the art, challenges and future directions
2024
Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems....
A survey on intrusion detection system in IoT networks
December 2025
As the Internet of Things (IoT) expands, the security of IoT networks has becoming more critical. Intrusion Detection Systems (IDS) are essential for protecting these networks against malicious activities....
Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends
December 2023
Healthcare information security is becoming a significant responsibility for all healthcare organisations and individuals. Innovative medical equipment and healthcare apps are vital to patient care,...
A survey on scalable consensus algorithms for blockchain technology
December 2025
The process of reaching an agreement on a value within a distributed network, known as a consensus problem, is a defining feature of blockchain. This consensus problem can be seen in various applications...
Authentication, access control and scalability models in Internet of Things Security–A review
December 2025
The Internet of Things (IoT) leads to the next phase of human interaction with technology. With the help of the IoT, physical objects can be given the ability to generate, receive, and seamlessly trade...
Federated learning-based intrusion detection system for the internet of things using unsupervised and supervised deep learning models
December 2025
The adoption of the Internet of Things (IoT) in our technology-driven society is hindered by security and data privacy challenges. To address these issues, Artificial Intelligence (AI) techniques such...
Securing industry 4.0: Assessing cybersecurity challenges and proposing strategies for manufacturing management
December 2025
Industry 4.0 represents the foundation of the fourth industrial revolution, characterised by the integration of innovative technology into the manufacturing process. This integration enhances automation,...
Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN
December 2023
•Reviews the current state-of-the-art access control deployed in businesses.•Reviews emerging and innovating access control in recent literature.•Applies access control to four domains: cloud, IoT,...
Addressing cybersecurity challenges in robotics: A comprehensive overview
December 2025
As robotics technology becomes increasingly integrated into various sectors, ensuring the cybersecurity of robotic systems is paramount. This article provides an in-depth exploration of the cybersecurity...
A comprehensive literature review on ransomware detection using deep learning
December 2025
The manifold rise in ransomware attacks noted highest in 2023 posing a serious trepidation for cyber professionals to be active watchdogs of the early detection techniques. Ransomware is a type of malware...
Enhancing cybersecurity resilience through advanced red-teaming exercises and MITRE ATT&CK framework integration: A paradigm shift in cybersecurity assessment
December 2025
As cybersecurity threats evolve alarmingly, conventional defense strategies are becoming increasingly ineffective. In response to this urgent challenge, our study presents a transformative approach...
An effective steganographic technique for hiding the image data using the LSB technique
December 2025
Steganography is the art and science of writing secret messages so that neither the sender nor the intended recipient knows there is a hidden message. Data hiding is the art of hiding data for various...
SDN enabled role based shared secret scheme for virtual machine security in cloud environment
2024
Cloud computing has given a new direction towards the usage of resources based on the demand without depending on the location. Even though there are many advantages with cloud computing there are challenges...
Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
December 2025
The Internet of Things (IoT) connects devices to enhance efficiency, productivity, and quality of life. However, deploying IoT networks introduces critical privacy and security challenges, including...
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
December 2025
The kind of cyber threat prevalent and most dangerous to networked systems is the Distributed Denial of Service (DDoS), especially with expanded connection of Internet of Things (IoT) devices. This...
Novel hybrid deep learning based cyber security threat detection model with optimization algorithm
December 2025
In order to continuously provide services to the company, the Internet of Things (IoT) connects the hardware, software, storing data, and applications that could be utilized as a new port of entry for...
A novel approach based on XGBoost classifier and Bayesian optimization for credit card fraud detection
December 2025
Nowadays, detecting fraudulent transactions has become increasingly important due to the rise of online businesses and the increasing use of sophisticated techniques by fraudsters to make fraudulent...
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact
2024
•We propose a secure deepfake mitigation framework using Elliptic Curve Cryptography (ECC)-based signature and encryption schemes.•The architecture of deepfake mitigation framework through general guidelines...
Secure and efficient drug supply chain management system: Leveraging polymorphic encryption, blockchain, and cloud storage integration
December 2025
The counterfeit medication infiltration within global supply chains poses a major public health threat. To address this, a collaborative effort among governments, regulators, and pharmaceutical companies...
Advancements in secure quantum communication and robust key distribution techniques for cybersecurity applications
December 2025
Quantum communication is a rapidly evolving field that leverages quantum physics to enable secure and efficient information exchange. A cornerstone of quantum cryptography is Quantum Key Distribution...
CNN Based Deep Learning Modeling with Explainability Analysis for Detecting Fraudulent Blockchain Transactions
December 2025
In the era of growing cryptocurrency adoption, Blockchain has emerged as a leading player in the digital payment landscape. However, this widespread popularity also brings forth various security challenges,...
A decentralised KYC based approach for microfinance using blockchain technology
December 2023
•The proposed lending model eliminates the middle parties like banks in the loan process. It decreases the time taken to a great extent.•The proposed decentralised KYC model eliminates a lot of human...
Mutual information based logistic regression for phishing URL detection
2024
Phishing is a cybersecurity problem that hackers employ to deceive individuals and organizations. Phishing is dynamic in nature; the hackers change several tricks to deceive the victims in multiple...
A novel approach for handling missing data to enhance network intrusion detection system
December 2025
Managing missing data is a critical challenge in Intrusion Detection System (IDS) datasets, significantly affecting the performance of deep learning models. To address this issue, we introduce DeepLearning_Based_MissingData_Imputation...