Recent Articles

Open access

ISSN: 2772-9184

Authentication, access control and scalability models in Internet of Things Security–A review

The Internet of Things (IoT) leads to the next phase of human interaction with technology. With the help of the IoT, physical objects can be given the ability to generate, receive, and seamlessly trade...

Share article

Survey of techniques to detect common weaknesses in program binaries

Software vulnerabilities resulting from coding weaknesses and poor development practices are common. Attackers can exploit these vulnerabilities and impact the security and privacy of end-users. Most...

Share article

Securing IoT devices with fast and energy efficient implementation of PRIDE and PRESENT ciphers

The rise of low-power, cost-efficient internet-connected devices has led to a need for lightweight cryptography. The lightweight block cipher PRIDE, designed by Martin R. Albrecht, is one of the most...

Share article

An improved three factor authentication protocol for wireless body area networks

Wireless Body Area Networks (WBAN) is a concrete solution for the healthcare system, and it is paramount to ensure the sensed data by the WBAN sensors is secure against vulnerable threats and inaccessible...

Share article

An approach for assessing the functional vulnerabilities criticality of CPS components

•A method for assessing the vulnerability criticality of CPS components is proposed.•CVSS scores are used for quantitative vulnerability analysis.•BAG is generated based on the CPS structure, considering...

Share article

Distributed and trustworthy digital twin platform based on blockchain and Web3 technologies

The fourth industrial revolution has significantly increased the adoption of Digital Twins (DTs) across various sectors, including intelligent manufacturing, automation, logistics, and medical analysis....

Share article

A novel approach for handling missing data to enhance network intrusion detection system

Managing missing data is a critical challenge in Intrusion Detection System (IDS) datasets, significantly affecting the performance of deep learning models. To address this issue, we introduce DeepLearning_Based_MissingData_Imputation...

Share article

A survey on scalable consensus algorithms for blockchain technology

The process of reaching an agreement on a value within a distributed network, known as a consensus problem, is a defining feature of blockchain. This consensus problem can be seen in various applications...

Share article

Securing industry 4.0: Assessing cybersecurity challenges and proposing strategies for manufacturing management

Industry 4.0 represents the foundation of the fourth industrial revolution, characterised by the integration of innovative technology into the manufacturing process. This integration enhances automation,...

Share article

Federated learning-based intrusion detection system for the internet of things using unsupervised and supervised deep learning models

The adoption of the Internet of Things (IoT) in our technology-driven society is hindered by security and data privacy challenges. To address these issues, Artificial Intelligence (AI) techniques such...

Share article

EMAKAS: An efficient three-factor mutual authentication and key-agreement scheme for IoT environment

The adoption of IoT in healthcare revolutionizes remote patient monitoring and healthcare efficiency. Yet, it brings notable security and privacy challenges, particularly in resource-constrained environment....

Share article

Bankruptcy forecasting in enterprises and its security using hybrid deep learning models

In current scenario when economic and risk management sectors need accurate predictions of enterprise bankruptcy, it is very importance issue to research in the field of security of enterprise bankruptcy....

Share article

An effective steganographic technique for hiding the image data using the LSB technique

Steganography is the art and science of writing secret messages so that neither the sender nor the intended recipient knows there is a hidden message. Data hiding is the art of hiding data for various...

Share article

Neural secret key enabled secure cloud storage with efficient packet checker algorithm

Cloud computing technology is utilized for the commercial purpose of implementing virtualization for the storage of data, which is then controlled and made accessible to users via remote servers. With...

Share article

A comprehensive investigation into robust malware detection with explainable AI

In today’s digital world, malware poses a serious threat to security and privacy by stealing sensitive data and disrupting computer systems. Traditional signature-based detection methods have become...

Share article

Automatic intrusion detection model with secure data storage on cloud using adaptive cyclic shift transposition with enhanced ANFIS classifier

Cloud computing has emerged as a pivotal technology in the computer electronics industry, offering users significant computing power and ample storage space. Security threats pose significant challenges...

Share article

Addressing cybersecurity challenges in robotics: A comprehensive overview

As robotics technology becomes increasingly integrated into various sectors, ensuring the cybersecurity of robotic systems is paramount. This article provides an in-depth exploration of the cybersecurity...

Share article

Novel hybrid deep learning based cyber security threat detection model with optimization algorithm

In order to continuously provide services to the company, the Internet of Things (IoT) connects the hardware, software, storing data, and applications that could be utilized as a new port of entry for...

Share article

Towards superior android ransomware detection: An ensemble machine learning perspective

Ransomware remains a pervasive threat to Android devices, with its ability to encrypt critical data and demand ransoms causing significant disruptions to users and organizations alike. This research...

Share article

Enhancing cybersecurity resilience through advanced red-teaming exercises and MITRE ATT&CK framework integration: A paradigm shift in cybersecurity assessment

As cybersecurity threats evolve alarmingly, conventional defense strategies are becoming increasingly ineffective. In response to this urgent challenge, our study presents a transformative approach...

Share article

A comprehensive literature review on ransomware detection using deep learning

The manifold rise in ransomware attacks noted highest in 2023 posing a serious trepidation for cyber professionals to be active watchdogs of the early detection techniques. Ransomware is a type of malware...

Share article

Software defined network and graph neural network-based anomaly detection scheme for high speed networks

In recent years, the proliferation of Software-Defined Networking (SDN) has revolutionized network management and operation. However, with SDN’s increased connectivity and dynamic nature, security threats...

Share article

Comparison of mitigating DDoS attacks in software defined networking and IoT platforms

The Software-Defined Networking (SDN) paradigm redefines the term "network" by enabling network managers to programmatically initialize, control, alter, and govern network behavior. Network engineers...

Share article

Earthworm Optimization Algorithm Based Cascade LSTM-GRU Model for Android Malware Detection

The rise in mobile malware risks brought on by the explosion of Android smartphones required more efficient detection techniques. Inspired by a cascade of Long Short-Term Memory (LSTM) and Gated Recurrent...

Share article

An application for predicting phishing attacks: A case of implementing a support vector machine learning model

The imminent threat that phishing websites poses is a major concern for internet users worldwide. These fraudulent websites are crafted by cyber attackers to appear trustworthy and deceive vulnerable...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.