Stop the war!
Остановите войну!
for scientists:
default search action
Security and Privacy, Volume 7
Volume 7, Number 1, January/February 2024
SURVEY ARTICLES
- Archan Dhadhania, Jitendra Bhatia, Rachana Mehta, Sudeep Tanwar, Ravi Sharma, Amit Verma:
Unleashing the power of SDN and GNN for network anomaly detection: State-of-the-art, challenges, and future directions. - Yassine Mekdad, Ahmet Aris, Abbas Acar, Mauro Conti, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes.
RESEARCH ARTICLES
- Ankita Mishra, Mohammad S. Obaidat, Dheerendra Mishra:
Privacy preserving content distribution framework for multidistributor DRM systems. - Mohammed Rauf Ali Khan:
Understanding impacts of a ransomware on medical and health facilities by utilizing LockBit as a case study. - Indu Kumari, Pranav Kumar Singh, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, Danda B. Rawat:
RFPM: A RSU-aided framework for pseudonym management to preserve location privacy in IoV. - B. S. Sharmila, Rohini Nagapadma:
P-DNN: Parallel DNN based IDS framework for the detection of IoT vulnerabilities. - Zeinab Zoghi, Gürsel Serpen:
UNSW-NB15 computer security dataset: Analysis through visualization. - Dominik Schrahe, Thomas Städter:
Privacy preserving vaccinating- and testing-pass for the European Union. - Martijn Dekker, Lampis Alevizos:
A threat-intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision-making. - Shyam Saurabh, Kishore Sinha:
Optimal key pre-distribution schemes from affine resolvable and partially affine resolvable designs. - Ravi Kumar, Samayveer Singh, Deepti Singh, Mohit Kumar, Sukhpal Singh Gill:
A robust and secure user authentication scheme based on multifactor and multi-gateway in IoT enabled sensor networks. - Md. Azharul Islam, Sanjay Madria:
Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation. - Subhas Barman, Samiran Chattopadhyay, Debasis Samanta:
Toward design a secure protocol for updating remotely stored credentials of a crypto-biometric framework for multi-server environment. - Shweta Sankhwar, Rupali Ahuja, Tanya Choubey, Priyanshi Jain, Tanusha Jain, Muskan Verma:
Cybercrime in India: An analysis of crime against women in ever expanding digital space. - Xiaole Su, Yuanchao Hu, Wei Liu, Zhipeng Jiang, Chan Qiu, Jie Xiong, Ju Sun:
A blockchain-based smart contract model for secured energy trading management in smart microgrids.
Volume 7, Number 2, March/April 2024
SURVEY PAPERS
- Parikshith Nayaka Sheetakallu Krishnaiah, Dayanand Lal Narayan, Kartick Sutradhar:
A survey on secure metadata of agile software development process using blockchain technology. - Hela Makina, Asma Ben Letaifa, Abderrezak Rachedi:
Survey on security and privacy in Internet of Things-based eHealth applications: Challenges, architectures, and future directions. - Abhishek Bisht, Ashok Kumar Das, Debasis Giri:
Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey.
RESEARCH ARTICLES
- Harshil Sanghvi, Rushir Bhavsar, Vini Hundlani, Lata Gohil, Tarjni Vyas, Anuja Nair, Shivani Desai, Nilesh Kumar Jadav, Sudeep Tanwar, Ravi Sharma, Nagendar Yamsani:
MetaHate: AI-based hate speech detection for secured online gaming in metaverse using blockchain. - Mohammed Riyadh Abdmeziem, Hiba Akli, Rima Zourane:
Nodes selection review for federated learning in the blockchain-based internet of things. - Himanshu Vadher, Pal Patel, Anuja Nair, Tarjni Vyas, Shivani Desai, Lata Gohil, Sudeep Tanwar, Deepak Garg, Anupam Singh:
EEG-based biometric authentication system using convolutional neural network for military applications. - Sandeep Sharma, Prachi Ahlawat, Kavita Khanna:
DeepMDFC: A deep learning based android malware detection and family classification method. - Deepa Rani, Rajeev Kumar, Naveen Chauhan:
A secure framework for IoT-based healthcare using blockchain and IPFS. - Vankamamidi Srinivasa Naresh, Sivaranjani Reddi:
An identity-based secure VANET communication system. - Heba A. Hassan, Ezz El-Din Hemdan, Walid El-Shafai, Mona Shokair, Fathi E. Abd El-Samie:
Detection of attacks on software defined networks using machine learning techniques and imbalanced data handling methods. - Umesh Bodkhe, Sudeep Tanwar:
V2XCom: Lightweight and secure message dissemination scheme for Internet of vehicles. - Vijay Karnatak, Amit Kumar Mishra, Neha Tripathi, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das:
A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications. - Alay Patel, Devam Patel, Riya Kakkar, Parita Rajiv Oza, Smita Agrawal, Sudeep Tanwar, Ravi Sharma, Nagendar Yamsani:
Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities. - N. Joychandra Singh, Nazrul Hoque, Kh Robindro Singh, Dhruba K. Bhattacharyya:
Botnet-based IoT network traffic analysis using deep learning. - Sangeeta Gupta, Premkumar Chithaluru, May El Barachi, Manoj Kumar:
Secure data access using blockchain technology through IoT cloud and fabric environment. - Mubeen Javed, Muhammad Arslan Akram, Adnan Noor Mian, Saru Kumari:
On the security of a novel privacy-preserving authentication scheme for V2G networks. - Grishan Pradhan, Babu R. Dawadi, Abiral Chaulagain, Anish Lal Joshi, Prajal Govinda Vaidya:
Chaos and DNA coding technique for image cryptography. - Upendra Verma, Mayank Sohani:
An efficient lightweight authentication scheme for dew-assisted IoT networks. - Pawan Kumar, Sukhdip Singh:
Enhancing android application security: A novel approach using DroidXGB for malware detection based on permission analysis. - Anusha Vangala, Ashok Kumar Das, Neeraj Kumar, Pandi Vijayakumar, Marimuthu Karuppiah, Youngho Park:
Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service.
Volume 7, Number 3, May/June 2024
RESEARCH ARTICLES
- Habib Esmaeelzadeh Rostam, Homayun Motameni, Rasul Enayatifar:
Privacy-preserving in the smart healthcare system using steganography and chaotic functions based on DNA. - Jegadeesan Subramani, Maria Azees, Arun Sekar Rajasekaran, Jaime Lloret:
Physically secure and privacy-preserving blockchain enabled authentication scheme for internet of drones. - Zhongming Huang, Feng Wang, Chin-Chen Chang, Xiuqiang Chen:
A new authentication scheme for dynamic charging system of electric vehicles in fog environment. - Harini Bilakanti, Sreevani Pasam, Varshini Palakollu, Sairam Utukuru:
Anomaly detection in IoT environment using machine learning. - Ruiqi Li, Fupeng Li, Peng Xu, Shuiting Du, Bingling Gu:
Location privacy protection of nodes in the perception layer of the Internet of things based on Radio Frequency Identification location aware algorithm. - Kunal Demla, Ashima Anand:
MieWC: Medical image encryption using wavelet transform and multiple chaotic maps. - P. P. Hema, Anchare V. Babu:
Full-duplex jamming for physical layer security improvement in NOMA-enabled overlay cognitive radio networks. - V. V. L. Divakar Allavarpu, Vankamamidi Srinivasa Naresh, A. Krishna Mohan:
Privacy-preserving credit risk analysis based on homomorphic encryption aware logistic regression in the cloud. - Keiichiro Oishi, Yuichi Sei, J. Andrew, Yasuyuki Tahara, Akihiko Ohsuga:
Algorithm to satisfy l-diversity by combining dummy records and grouping. - Osamah Ibrahim Khalaf, Ashokkumar S. R, Sameer Algburi, Anupallavi S, Dhanasekaran Selvaraj, Mhd Saeed Sharif, Wael Elmedany:
Federated learning with hybrid differential privacy for secure and reliable cross-IoT platform knowledge sharing. - Priyabrata Dash, Monalisa Sarma, Debasis Samanta:
Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications. - Ikram Ud Din, Wajahat Ali, Ahmad Almogren, Iehab Al Rassan, Sherali Zeadally:
Using smart grid infrastructure for authentication and data management in Internet of Medical Things.
SURVEY PAPERS
- Isha Pali, Ruhul Amin, Mohammad Abdussami:
Autonomous vehicle security: Current survey and future research challenges. - Animesh Kumar, Sandip Dutta, Prashant Pranav:
Analysis of SQL injection attacks in the cloud and in WEB applications.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.