


default search action
Security and Privacy, Volume 4
Volume 4, Number 1, January 2021
- Shweta Sankhwar

, Dhirendra Pandey, Raees Ahmad Khan
, Sachi Nandan Mohanty
:
An anti-phishing enterprise environ model using feed-forward backpropagation and Levenberg-Marquardt method. - Saurabh Rana

, Dheerendra Mishra
:
Cryptanalysis and improvement of biometric based content distribution framework for digital rights management systems. - Ilija Basicevic

, Nikola Blazic, Stanislav Ocovaj:
On the use of generalized entropy formulas in detection of denial-of-service attacks. - Oladayo Olufemi Olakanmi

, Kehinde Oluwasesan Odeyemi:
A secure and collaborative data aggregation scheme for fine-grained data distribution and management in Internet of Things. - Fei Liu

, Hongyan Gao, Ze-Gang Wei:
Research on the game of network security attack-defense confrontation through the optimal defense strategy. - Gang Wang

:
Comparative study on different neural networks for network security situation prediction. - Reem Alotaibi

, Tahani Alnazzawi, Nermin Hamza:
A new location-based privacy protection algorithm with deep learning.
Volume 4, Number 2, March 2021
- Ben Underwood, Hossein Saiedian

:
Mass surveillance: A study of past practices and technologies to predict future directions. - Shubhi Srivastava, Mohit

, Arun Kumar
, Sudhanshu Kumar Jha
, Pratibha Dixit, Shiv Prakash
:
Event-driven data alteration detection using block-chain.
- Fatemeh Ghiyamipour

:
Secure graphical password based on cued click points using fuzzy logic. - Kanos Matyokurehwa

, Norman Rudhumbu, Cross Gombiro, Chiedza Mlambo:
Cybersecurity awareness in Zimbabwean universities: Perspectives from the students. - Suat Mercan

, Mumin Cebe, Ramazan Savas Aygün, Kemal Akkaya, Elijah Toussaint, Dominik Danko:
Blockchain-based video forensics and integrity verification framework for wireless Internet-of-Things devices. - Uche C. Agwi

, Martins E. Irhebhude
, Francisca Nonyelum Ogwueleka:
Video surveillance in examination monitoring. - Yehia Ibrahim Alzoubi

, Valmira H. Osmanaj, Ashraf Jaradat
, Ahmad Salah Al-Ahmad
:
Fog computing security and privacy for the Internet of Thing applications: State-of-the-art. - Mahdi Ajdani

, Hamid Reza Ghaffary
:
Introduced a new method for enhancement of intrusion detection with random forest and PSO algorithm. - Nissa Mehibel

, M'hamed Hamadouche:
Authenticated secret session key using elliptic curve digital signature algorithm.
Volume 4, Number 3, May 2021
- Victor R. Kebande

, Nickson M. Karie
, Kim-Kwang Raymond Choo
, Sadi Alawadi
:
Digital forensic readiness intelligence crime repository.
- Ricardo M. Czekster

, Charles Morisset, John A. Clark, Sadegh Soudjani, Charalampos Patsios, Peter Davison:
Systematic review of features for co-simulating security incidents in Cyber-Physical Systems.
- Sheunesu M. Makura

, H. S. Venter, Victor R. Kebande
, Nickson M. Karie, Richard Adeyemi Ikuesan, Sadi Alawadi:
Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring. - Seyed Meysam Zarei

, Reza Fotohi
:
Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem. - Pietro Russo

, Lorenzo Bracciale, Giuseppe Bianchi:
Dare-to-Share: Collaborative privacy-preserving recommendations with (almost) no crypto. - Gamal Eldin I. Selim, Ezz El-Din Hemdan

, Ahmed M. Shehata, Nawal A. El-Fishawy:
An efficient machine learning model for malicious activities recognition in water-based industrial internet of things. - Marriette Katarahweire

, Engineer Bainomugisha, Khalid A. Mughal, John Ngubiri:
Form-based security in mobile health data collection systems. - Saeed Banaeian Far

, Azadeh Imani Rad:
Distributed auditing protocol for blockchain-based transactions using a distributed signature.
Volume 4, Number 4, July 2021
- Kamrul Faisal

:
Balancing between Right to Be Forgotten and Right to Freedom of Expression in Spent Criminal Convictions. - Oladayo Olufemi Olakanmi

, Kehinde Oluwasesan Odeyemi:
Throttle: An efficient approach to mitigate distributed denial of service attacks on software-defined networks. - Humza Ahmad

, Laszlo Erdodi:
Overview of phishing landscape and homographs in Arabic domain names. - Kamrun Nahar

, Asif Qumer Gill
, Terry Roach:
Developing an access control management metamodel for secure digital enterprise architecture modeling. - Shivansh Kumar, Ruhul Amin

:
Mitigating distributed denial of service attack: Blockchain and software-defined networking based approach, network model with future research challenges.
- Affan Yasin

, Rubia Fatima
, Lin Liu, Jianmin Wang
, Raian Ali
, Ziqi Wei:
Understanding and deciphering of social engineering attack scenarios.
Volume 4, Number 5, September 2021
- Shivansh Kumar, Aman Kumar Bharti, Ruhul Amin

:
Decentralized secure storage of medical records using Blockchain and IPFS: A comparative analysis with future directions.
- Chukhu Chunka

, Rajat Subhra Goswami, Subhasish Banerjee:
An efficient mechanism to generate dynamic keys based on genetic algorithm. - Somia Sahraoui

, Azeddine Bilami
:
Securing human-to-thing interactions in the Internet of Things with asymmetric and selective mechanism. - Cynara Justine

, Rendhir R. Prasad, Ciza Thomas:
Game theoretical analysis of usable security and privacy. - Oladayo Olufemi Olakanmi

, Adedamola Dada:
An efficient point-to-point security solution for multihop routing in wireless sensor networks. - Moses Ashawa

, Sarah Morris
:
Android Permission Classifier: a deep learning algorithmic framework based on protection and threat levels. - Tatyana Stojnic, Dinusha Vatsalan, Nalin A. G. Arachchilage

:
Phishing email strategies: Understanding cybercriminals' strategies of crafting phishing emails. - Sandeep Kumar Panda

, Gouse Baig Mohammad, Sachi Nandan Mohanty
, Sipra Sahoo:
Smart contract-based land registry system to reduce frauds and time delay. - Rui Fu

, Xinyu Li:
Malicious attacks on the web and crawling of information data by Python technology.
Volume 4, Number 6, November 2021
- Haotian Wu

, Xin Li, Caterina M. Scoglio, Don Gruenbacher:
Security inspection resource allocation in real time using SDN. - Sudip Misra, Sumit Goswami, Chaynika Taneja, Pushpendu Kar

:
Heterogeneous polydentate mobile chelating node to detect breach in surveillance sensor network. - Dhaneshwar Mardi

, Surbhi Tanwar, Jaydeep Howlader
:
Multiparty protocol that usually shuffles. - Ahm Shamsuzzoha

, Heli Raappana
:
Perspectives of business process ethics in data-driven marketing management. - R. Shashidhara

, Nisha Ahuja, M. Lajuvanthi, S. Akhila, Ashok Kumar Das
, Joel J. P. C. Rodrigues:
SDN-chain: Privacy-preserving protocol for software defined networks using blockchain. - Zhijun Li

, Xuedong Jiang:
Detection and defense of network virus using data mining technology. - Li Yuan

:
Prediction of network security situation awareness based on an improved model combined with neural network.
- Aditya Bahl, Aastha Sharma, Muhammad Rizwan Asghar

:
Vulnerability disclosure and cybersecurity awareness campaigns on twitter during COVID-19.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














