Any Bluetooth device can be hacked. Know how?
2024
In today's world, Bluetooth technology is integrated into almost every device we use, from wireless headsets, mice, and keyboards to cars and smart home devices. But with the convenience of this technology...
Share article
Cyber security: State of the art, challenges and future directions
2024
Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems....
Share article
Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends
December 2023
Healthcare information security is becoming a significant responsibility for all healthcare organisations and individuals. Innovative medical equipment and healthcare apps are vital to patient care,...
Share article
Securing industry 4.0: Assessing cybersecurity challenges and proposing strategies for manufacturing management
December 2025
Industry 4.0 represents the foundation of the fourth industrial revolution, characterised by the integration of innovative technology into the manufacturing process. This integration enhances automation,...
Share article
Authentication, access control and scalability models in Internet of Things Security–A review
December 2025
The Internet of Things (IoT) leads to the next phase of human interaction with technology. With the help of the IoT, physical objects can be given the ability to generate, receive, and seamlessly trade...
Share article
Federated learning-based intrusion detection system for the internet of things using unsupervised and supervised deep learning models
December 2025
The adoption of the Internet of Things (IoT) in our technology-driven society is hindered by security and data privacy challenges. To address these issues, Artificial Intelligence (AI) techniques such...
Share article
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact
2024
•We propose a secure deepfake mitigation framework using Elliptic Curve Cryptography (ECC)-based signature and encryption schemes.•The architecture of deepfake mitigation framework through general guidelines...
Share article
A survey on scalable consensus algorithms for blockchain technology
December 2025
The process of reaching an agreement on a value within a distributed network, known as a consensus problem, is a defining feature of blockchain. This consensus problem can be seen in various applications...
Share article
Distributed and trustworthy digital twin platform based on blockchain and Web3 technologies
December 2025
The fourth industrial revolution has significantly increased the adoption of Digital Twins (DTs) across various sectors, including intelligent manufacturing, automation, logistics, and medical analysis....
Share article
Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN
December 2023
•Reviews the current state-of-the-art access control deployed in businesses.•Reviews emerging and innovating access control in recent literature.•Applies access control to four domains: cloud, IoT,...
Share article
SDN enabled role based shared secret scheme for virtual machine security in cloud environment
2024
Cloud computing has given a new direction towards the usage of resources based on the demand without depending on the location. Even though there are many advantages with cloud computing there are challenges...
Share article
An effective steganographic technique for hiding the image data using the LSB technique
December 2025
Steganography is the art and science of writing secret messages so that neither the sender nor the intended recipient knows there is a hidden message. Data hiding is the art of hiding data for various...
Share article
An application for predicting phishing attacks: A case of implementing a support vector machine learning model
2024
The imminent threat that phishing websites poses is a major concern for internet users worldwide. These fraudulent websites are crafted by cyber attackers to appear trustworthy and deceive vulnerable...
Share article
A novel approach for handling missing data to enhance network intrusion detection system
December 2025
Managing missing data is a critical challenge in Intrusion Detection System (IDS) datasets, significantly affecting the performance of deep learning models. To address this issue, we introduce DeepLearning_Based_MissingData_Imputation...
Share article
A comprehensive investigation into robust malware detection with explainable AI
December 2025
In today’s digital world, malware poses a serious threat to security and privacy by stealing sensitive data and disrupting computer systems. Traditional signature-based detection methods have become...
Share article
Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security
2024
•Investigates machine learning (ML) algorithms for intrusion detection.•Uses large data set of 126,000 samples from NSL-KDD for experiments.•Analyses random projection and principal component analysis's...
Share article
Securing IoT devices with fast and energy efficient implementation of PRIDE and PRESENT ciphers
December 2025
The rise of low-power, cost-efficient internet-connected devices has led to a need for lightweight cryptography. The lightweight block cipher PRIDE, designed by Martin R. Albrecht, is one of the most...
Share article
Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments
2024
Vehicular ad-hoc network (VANET) technology has gained prominence, especially in the context of the emerging field of VANET Cloud as an integral part of connected and autonomous vehicles. The automotive...
Share article
Survey of techniques to detect common weaknesses in program binaries
December 2025
Software vulnerabilities resulting from coding weaknesses and poor development practices are common. Attackers can exploit these vulnerabilities and impact the security and privacy of end-users. Most...
Share article
Security analysis of cyber physical system using digital forensic incident response
2024
There is a great demand for an efficient security tool which can secure IIoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IIoT considering...
Share article
A survey on exploring the challenges and applications of wireless body area networks (WBANs)
2024
Networks play an important role in the day-to-day life of every individual. Networks are involved in the transmission of necessary information between the sender and receiver in the channel. Wireless...
Share article
Mutual information based logistic regression for phishing URL detection
2024
Phishing is a cybersecurity problem that hackers employ to deceive individuals and organizations. Phishing is dynamic in nature; the hackers change several tricks to deceive the victims in multiple...
Share article
EMAKAS: An efficient three-factor mutual authentication and key-agreement scheme for IoT environment
December 2025
The adoption of IoT in healthcare revolutionizes remote patient monitoring and healthcare efficiency. Yet, it brings notable security and privacy challenges, particularly in resource-constrained environment....
Share article
A novel dual optimized IDS to detect DDoS attack in SDN using hyper tuned RFE and deep grid network
2024
Technological advancement is one of the factors contributing to a rise of susceptible cyberattacks. Distributed denial of service (DDoS) attack reduces the efficiency of network servers by saturating...
Share article
An improved three factor authentication protocol for wireless body area networks
December 2025
Wireless Body Area Networks (WBAN) is a concrete solution for the healthcare system, and it is paramount to ensure the sensed data by the WBAN sensors is secure against vulnerable threats and inaccessible...
Share article