Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
December 2025
The Internet of Things (IoT) connects devices to enhance efficiency, productivity, and quality of life. However, deploying IoT networks introduces critical privacy and security challenges, including...
Share article
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
December 2025
The kind of cyber threat prevalent and most dangerous to networked systems is the Distributed Denial of Service (DDoS), especially with expanded connection of Internet of Things (IoT) devices. This...
Share article
Cyber intrusion detection using ensemble of deep learning with prediction scoring based optimized feature sets for IOT networks
December 2025
Detecting intrusions in Internet of Things (IoT) networks is critical for maintaining cybersecurity. Traditional Intrusion Detection Systems (IDS) often face challenges in identifying unknown attacks...
Share article
Leveraging blockchain for robust and transparent E-voting systems
December 2025
Voting is considered one of the most critical actions for proper decision-making in governmental entities, boards of directors, and the financial sector. Many researchers proposed E-voting systems where...
Share article
Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain
December 2025
•Security challenges in RFID, edge computing and blockchain enabled supply chains are analysed, focusing on authentication.•A lightweight mutual authentication protocol is proposed for RFID-based supply...
Share article
An explainable ensemble-based intrusion detection system for software-defined vehicle ad-hoc networks
December 2025
Intrusion Detection Systems (IDS) are widely employed to detect and mitigate external network security events. Vehicle ad-hoc Networks (VANETs) continue to evolve, especially with developments related...
Share article
A Novel Approach based on XGBoost Classifier and Bayesian Optimization for Credit Card Fraud Detection
Available online 12 April 2025
Nowadays, detecting fraudulent transactions has become increasingly important due to the rise of online businesses and the increasing use of sophisticated techniques by fraudsters to make fraudulent...
Share article
Multimodal Deep Neural Network for UAV GPS jamming attack detection
Available online 10 April 2025
Despite the progress in Unmanned Aerial Vehicles, various issues remain related to their cybersecurity. One of these issues is GPS jamming attacks. GPS jamming attacks can cause UAVs to lose control...
Share article
Design of Distributed Denial-of-Service Attack Mechanism for IoT-Driven Data Fusion System
Available online 8 April 2025
In the current era, informatics systems technology is advancing at a rapid pace, and as a result, the Internet of Things (IoT) has become increasingly important to daily life in many ways. Multi-sensor...
Share article
Blockchain-Integrated Image Steganography using xDoG Edge Detection for Authentication
Available online 2 April 2025
The fusion of image steganography with blockchain technology have brought about novel prospects for safe and decentralized authentication systems in recent years. In this paper, we propose a blockchain-based...
Share article
Advancements in secure quantum communication and robust key distribution techniques for cybersecurity applications
Available online 14 March 2025
Quantum communication is a rapidly evolving field that leverages quantum physics to enable secure and efficient information exchange. A cornerstone of quantum cryptography is Quantum Key Distribution...
Share article
An application for predicting phishing attacks: A case of implementing a support vector machine learning model
2024
The imminent threat that phishing websites poses is a major concern for internet users worldwide. These fraudulent websites are crafted by cyber attackers to appear trustworthy and deceive vulnerable...
Share article
SDN enabled role based shared secret scheme for virtual machine security in cloud environment
2024
Cloud computing has given a new direction towards the usage of resources based on the demand without depending on the location. Even though there are many advantages with cloud computing there are challenges...
Share article
Security analysis of cyber physical system using digital forensic incident response
2024
There is a great demand for an efficient security tool which can secure IIoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IIoT considering...
Share article
Quantum vs post‐quantum security for future networks: Survey
2024
Classical cryptography (crypt) schemes (sche) have been compromised by the practical results on quantum (q) computers in recent years. Nowadays these sche ‘s can be compromised by using the Shor's methodology....
Share article
Any Bluetooth device can be hacked. Know how?
2024
In today's world, Bluetooth technology is integrated into almost every device we use, from wireless headsets, mice, and keyboards to cars and smart home devices. But with the convenience of this technology...
Share article
A novel dual optimized IDS to detect DDoS attack in SDN using hyper tuned RFE and deep grid network
2024
Technological advancement is one of the factors contributing to a rise of susceptible cyberattacks. Distributed denial of service (DDoS) attack reduces the efficiency of network servers by saturating...
Share article
Automatic generation of security protocols attacks specifications and implementations
2024
Confidence in a communication protocol’s security is a key requirement for its deployment and long-term maintenance. Checking if a vulnerability exists and is exploitable requires extensive expertise....
Share article
Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security
2024
•Investigates machine learning (ML) algorithms for intrusion detection.•Uses large data set of 126,000 samples from NSL-KDD for experiments.•Analyses random projection and principal component analysis's...
Share article
Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings
2024
Ambient intelligence technologies have the potential to transform healthcare by providing personalized, context-aware, and proactive support for patients and healthcare providers. However, the use of...
Share article
A survey on exploring the challenges and applications of wireless body area networks (WBANs)
2024
Networks play an important role in the day-to-day life of every individual. Networks are involved in the transmission of necessary information between the sender and receiver in the channel. Wireless...
Share article
E-Brightpass: A Secure way to access social networks on smartphones
2024
Social network providers offer a variety of entertainment services in exchange for end users’ personal information, such as their identity. The majority of users access social networking sites via their...
Share article
Efficient time-oriented latency-based secure data encryption for cloud storage
2024
To ensure data security in the cloud, there exist several techniques proposed by various researchers. The most common method is the usage of data encryption techniques like profile, rule, and attribute-based...
Share article
A blockchain-based anonymous reporting system with no central authority: Architecture and protocol
2024
•Embedding a private blockchain into a public blockchain.•Submitting reports on a public blockchain anonymously.•Using ring signature to provide anonymity.•Removing central authority.•Applying a secret...
Share article
Mutual information based logistic regression for phishing URL detection
2024
Phishing is a cybersecurity problem that hackers employ to deceive individuals and organizations. Phishing is dynamic in nature; the hackers change several tricks to deceive the victims in multiple...
Share article