Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security
2024
•Investigates machine learning (ML) algorithms for intrusion detection.•Uses large data set of 126,000 samples from NSL-KDD for experiments.•Analyses random projection and principal component analysis's...
Share article
Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings
2024
Ambient intelligence technologies have the potential to transform healthcare by providing personalized, context-aware, and proactive support for patients and healthcare providers. However, the use of...
Share article
A survey on exploring the challenges and applications of wireless body area networks (WBANs)
2024
Networks play an important role in the day-to-day life of every individual. Networks are involved in the transmission of necessary information between the sender and receiver in the channel. Wireless...
Share article
E-Brightpass: A Secure way to access social networks on smartphones
2024
Social network providers offer a variety of entertainment services in exchange for end users’ personal information, such as their identity. The majority of users access social networking sites via their...
Share article
Efficient time-oriented latency-based secure data encryption for cloud storage
2024
To ensure data security in the cloud, there exist several techniques proposed by various researchers. The most common method is the usage of data encryption techniques like profile, rule, and attribute-based...
Share article
A blockchain-based anonymous reporting system with no central authority: Architecture and protocol
2024
•Embedding a private blockchain into a public blockchain.•Submitting reports on a public blockchain anonymously.•Using ring signature to provide anonymity.•Removing central authority.•Applying a secret...
Share article
Mutual information based logistic regression for phishing URL detection
2024
Phishing is a cybersecurity problem that hackers employ to deceive individuals and organizations. Phishing is dynamic in nature; the hackers change several tricks to deceive the victims in multiple...
Share article
Cyber security: State of the art, challenges and future directions
2024
Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems....
Share article
Secure and sustainable food processing supply chain framework based on Hyperledger Fabric technology
2024
Food processing supply chains are gradually facing the problem of incorporation and sustainability because of the complexity of many participants involved in the supply chain network. Customers are...
Share article
A three-factor mutual authentication scheme for telecare medical information system based on ECC
2024
In critical pandemic situations, the Telecare Medical Information System (TMIS) is a technological invention that offers secure and authentic patient registration and medical services remotely. Wireless...
Share article
Increasing embedding capacity of stego images by exploiting edge pixels in prediction error space
2024
•An image steganography approach has been proposed for efficient data hiding on the edges of an image. We have applied edge detectors in prediction error space to increase the embedding capacity of...
Share article
Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments
2024
Vehicular ad-hoc network (VANET) technology has gained prominence, especially in the context of the emerging field of VANET Cloud as an integral part of connected and autonomous vehicles. The automotive...
Share article
Energy-efficient classification strategy for detecting interference and malicious sensor nodes in wireless body area Networks
2024
Wireless Body Area Networks (WBANs) play a vital role in healthcare monitoring, using wireless sensors to track physiological parameters and predict illness onset. This study proposes a novel approach...
Share article
Colour image encryption algorithm using Rubik’s cube scrambling with bitmap shuffling and frame rotation
2024
The 21st century has seen a significant increase in the usage of multimedia to transfer information. Algorithms used for the encryption of plain text are not suitable for multimedia encryption. This...
Share article
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact
2024
•We propose a secure deepfake mitigation framework using Elliptic Curve Cryptography (ECC)-based signature and encryption schemes.•The architecture of deepfake mitigation framework through general guidelines...
Share article
A comprehensive literature review on ransomware detection using deep learning
Available online 30 November 2024
The manifold rise in ransomware attacks noted highest in 2023 posing a serious trepidation for cyber professionals to be active watchdogs of the early detection techniques. Ransomware is a type of malware...
Share article
Software Defined Network and Graph Neural Network-based Anomaly Detection Scheme for High Speed Networks
Available online 30 November 2024
In recent years, the proliferation of Software-Defined Networking (SDN) has revolutionized network management and operation. However, with SDN’s increased connectivity and dynamic nature, security threats...
Share article
Enhancing Cybersecurity Resilience through Advanced Red Teaming Exercises and MITRE ATT&CK Framework Integration: A Paradigm Shift in Cybersecurity Assessment
Available online 7 November 2024
As cybersecurity threats evolve at an alarming pace, conventional defense strategies are becoming progressively less effective. Addressing this urgent challenge, our study introduces a transformative...
Share article
Bankruptcy Forecasting in Enterprises and its Security Using Hybrid Deep Learning Models
Available online 10 August 2024
In current scenario when economic and risk management sectors need accurate predictions of enterprise bankruptcy, it is very importance issue to research in the field of security of enterprise bankruptcy....
Share article
Adoption of blockchain to develop a deployable secure healthcare solution: An analysis
Available online 5 August 2024
Blockchain technology has grown enormously in diverse, intelligent applications with high security, transparency, and trust, but performance analysis is still a concern. Various debugging and analysis...
Share article
Edge intelligent collaborative privacy protection solution for smart medical
December 2023
In the era of big data, competent medical care has entered people’s lives. However, the existing intelligent diagnosis models have low accuracy and poor universality. At the same time, there is a risk...
Share article
A decentralised KYC based approach for microfinance using blockchain technology
December 2023
•The proposed lending model eliminates the middle parties like banks in the loan process. It decreases the time taken to a great extent.•The proposed decentralised KYC model eliminates a lot of human...
Share article
Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends
December 2023
Healthcare information security is becoming a significant responsibility for all healthcare organisations and individuals. Innovative medical equipment and healthcare apps are vital to patient care,...
Share article
Cryptanalysis on “a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ”
December 2023
The health-care delivery services were made possible by telecare medicine information systems (TMIS). These systems are paving the way for a world where computerised telecare facilities and automated...
Share article
Design of blockchain-enabled secure smart health monitoring system and its testbed implementation
December 2023
•In this paper, an architecture of the blockchain-enabled secure smart health monitoring system is proposed (in short BSSHM).•The threat model related to the BSSHM is also provided.•The formal security...
Share article