


default search action
Cyber Security and Applications, Volume 2
Volume 2, 2024
- Chaitanyateja Thotadi, Monith Debbala, Subba Rao, Ajay Eeralla, Basker Palaniswamy
, Srijanee Mookherji
, Vanga Odelu, Alavalapati Goutham Reddy:
E-Brightpass: A Secure way to access social networks on smartphones. 100021 - Shahnawaz Ahmad
, Shabana Mehfuz:
Efficient time-oriented latency-based secure data encryption for cloud storage. 100027 - Habiba Sultana, A. H. M. Kamal, Tasnim Sakib Apon, Md. Golam Rabiul Alam:
Increasing embedding capacity of stego images by exploiting edge pixels in prediction error space. 100028 - Aditi Nair
, Diti Dalal
, Ramchandra S. Mangrulkar
:
Colour image encryption algorithm using Rubik's cube scrambling with bitmap shuffling and frame rotation. 100030 - Wasyihun Sema Admass
, Yirga Yayeh Munaye
, Abebe Abeshu Diro:
Cyber security: State of the art, challenges and future directions. 100031 - Saeed Banaeian Far
, Maryam Rajabzadeh Asaar:
A blockchain-based anonymous reporting system with no central authority: Architecture and protocol. 100032 - Faisal Nabi
, Xujuan Zhou
:
Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security. 100033 - Pranita Binnar
, Sunil Bhirud, Faruk Kazi:
Security analysis of cyber physical system using digital forensic incident response. 100034 - Emmanuel Song Shombot
, Gilles Dusserre, Robert Bestak, Nasir Baba Ahmed
:
An application for predicting phishing attacks: A case of implementing a support vector machine learning model. 100036 - Himanshu Setia, Amit Chhabra, Sunil K. Singh
, Sudhakar Kumar
, Sarita Sharma, Varsha Arya, Brij B. Gupta, Jinsong Wu
:
Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments. 100037 - Muthukumar Manickam
, Ganesh Gopal Devarajan:
A three-factor mutual authentication scheme for telecare medical information system based on ECC. 100035 - Rémi Garcia
, Paolo Modesti
:
Automatic generation of security protocols attacks specifications and implementations. 100038 - Savo Glisic
:
Quantum vs post-quantum security for future networks: Survey. 100039 - Mohammad Wazid
, Amit Kumar Mishra
, Noor Mohd, Ashok Kumar Das:
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact. 100040 - Prathibha Muraleedhara
, Mary Subaja Christo
, Jaya J, Yuvasini D:
Any Bluetooth device can be hacked. Know how? 100041 - Nalayini Cm, Jeevaa Katiravan, Geetha S, Christy Eunaicy Ji:
A novel dual optimized IDS to detect DDoS attack in SDN using hyper tuned RFE and deep grid network. 100042 - H. M. Anitha, P. Jayarekha, Audithan Sivaraman
, Ashima Mehta, Nalina Venkatamune:
SDN enabled role based shared secret scheme for virtual machine security in cloud environment. 100043 - Vajratiya Vajrobol
, Brij B. Gupta, Akshat Gaurav:
Mutual information based logistic regression for phishing URL detection. 100044 - Mosiur Rahaman
, Farhin Tabassum, Varsha Arya, Ritika Bansal:
Secure and sustainable food processing supply chain framework based on Hyperledger Fabric technology. 100045 - Tarun Vats, Sudhakar Kumar
, Sunil K. Singh
, Uday Madan, Mehak Preet
, Varsha Arya, Ritika Bansal, Ammar Almomani:
Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings. 100046 - Arun Sekar Rajasekaran, L. Sowmiya, Maria Azees
, R. Kannadasan:
A survey on exploring the challenges and applications of wireless body area networks (WBANs). 100047 - Mohd Kaleem, Ganesh Gopal Devarajan:
Energy-efficient classification strategy for detecting interference and malicious sensor nodes in wireless body area Networks. 100048

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
