


default search action
Security and Privacy, Volume 8
Volume 8, Number 1, January/February 2025
Opinion
- Victor R. Kebande, Richard Adeyemi Ikuesan:

Standardizing Industrial Internet of Things (IIoT) Forensic Processes.
Research Article
- Gagan Dangwal, Mohammad Wazid

, Sarah Nizam, Vinay Chamola, Ashok Kumar Das
:
Automotive Cybersecurity Scheme for Intrusion Detection in CAN-Driven Artificial Intelligence of Things. - Changrong Li

, Wei Duan, Zhenfu Li:
Deep Learning-Based Community Detection Attack: Arctic Shipping Data as a Case. - Yunus Emre Göktepe

, Yusuf Uzun
:
IDDLE: A Novel Deep Learning-Based Approach for Intrusion Detection Problem Using Feature Extraction. - Maciej Rys

, Agata Slusarek, Krzysztof Zielinski
:
Caught Off Guard: When Experts Fall for Quishing, Is Awareness Enough? - Rajendra Prasad Nayak, Sourav Kumar Bhoi, Kshira Sagar Sahoo

, Srinivas Sethi, Subasish Mohapatra, Monowar Bhuyan:
Unveiling Sybil Attacks Using AI-Driven Techniques in Software-Defined Vehicular Networks. - Liang Chen

, Cheng Zeng, Stilianos Vidalis, Wei Jie:
Managing Obligation Delegation: Incentive Model and Experiment. - Reza Mohammadi, Mohammad Mehdi Hosseini

, R. Bahrami:
Uncovering security vulnerabilities through multiplatform malware analysis. - Shyam R. Sihare

:
Guided and unguided approaches for quantum key distribution for secure quantum communication. - Ehtesham Safeer, Sidra Tahir, Asif Nawaz

, Mamoona Humayun
, Momina Shaheen
, Maqbool Khan
:
Advanced hybrid malware identification framework for the Internet of Medical Things, driven by deep learning. - Dhananjay Kumar Singh

, Diwakar Bhardwaj:
An EAADE: Effective Authentication Approach for Data Exchange in Vehicular Social Network for IoV.
Survey Article
- R. Shashidhara

, Renju C. Nair
, Pavan Kumar Panakalapati
:
Promise of Zero-Knowledge Proofs (ZKPs) for Blockchain Privacy and Security: Opportunities, Challenges, and Future Directions.
Research Article
- Tao Tan

, Liming Zhang, Shuaikang Liu, Lei Wang:
An Encryption Algorithm Based on Public-Key Cryptosystems for Vector Map. - Bhomik M. Gandhi, Shruti B. Vaghadia, Malaram Kumhar

, Rajesh Gupta, Nilesh Kumar Jadav, Jitendra Bhatia
, Sudeep Tanwar
, Abdulatif Alabdulatif
:
Homomorphic Encryption and Collaborative Machine Learning for Secure Healthcare Analytics. - Suryya Farhat

, Manoj Kumar, Anshul Srivastava, Shilpi Bisht
, Vinay Rishiwal
, Mano Yadav:
Enhancing E-Healthcare Data Privacy Through Efficient Dual Signature on Twisted Edwards Curves Encryption Decryption. - Jun-Won Ho

:
Game Theoretic Approach Toward Detection of Input-Driven Evasive Malware in the IoT. - Rasim M. Alguliyev, Ramiz Shikhaliyev

:
Computer Networks Cybersecurity Monitoring Based on Deep Learning Model. - Mohd Shadab, Md Saquib Jawed

, Mohammad Sajid:
Substitution Box Construction Using Transfer-Function Assisted Metaheuristic and Booster Algorithm: A Hybrid Approach. - Doina Gavrilov

:
Exploring Novel Frontiers in Online Privacy Ethics. - Mohammad Wazid

, Shivansh Nautiyal, Ashok Kumar Das
, Sachin Shetty, SK Hafizul Islam
:
A Secure Authenticated Healthcare Data Analysis Mechanism in IoMT-Enabled Healthcare. - Abdallah Alshantti

, Adil Rasheed, Frank Westad:
Privacy Re-Identification Attacks on Tabular GANs. - Mohamed Ilies Taleb

, Mustapha Benssalah:
UAV Jamming Localization Against Random Eavesdropper Positions Using Cuckoo Search Algorithm. - Nitin Rathore, Aparna Kumari, Margi Patel, Alok Chudasama, Dhyey Bhalani, Sudeep Tanwar

, Abdulatif Alabdulatif
:
Synergy of AI and Blockchain to Secure Electronic Healthcare Records. - Elham Asadi

, Soodeh Hosseini
:
Modeling of Malware Propagation Under the Clustering Approach in Scale-Free Networks. - Mehdi Darbandi, Ali Ehsani

, Farzad Bahrami
, Elham Moghadamnia, Karlo Abnoosian, Bayan Omar Mohammed:
A New Feature-Based Biometric Identification System in IoT-Powered Smart Cities Using a Hybrid Optimization Algorithm. - Shipra Ravi Kumar

, Mukta Goyal:
Design of an Iterative Method for Blockchain Optimization Incorporating DeepMiner and AnoBlock. - Shuhui Su

, Yonghan Luo, Tao Li, Qi Chen, Juntao Liang:
Anti-Leakage Method of Sensitive Information of Network Documents Based on Differential Privacy Model. - Raja Sekar Jayaram

, Dinesh Balajothi, Deepu Natchirajan:
Improved Mobile Security Based on Two-Factor Authentication.
Volume 8, Number 2, March/April 2025
Research Article
- Hassan Mohammadi, Soodeh Hosseini

:
Mobile Botnet Attacks Detection Using Supervised Learning Algorithms. - Sudheesh K. V.

, S. Benaka Santhosha, Kiran Puttegowda, Vinayakumar Ravi
, Alanoud Al Mazroa:
A High-Security Chaotic Encryption Model for Biomedical Image Protection. - Daniel Kwame Amissah

, Winfred Yaokumah, Edward Danso Ansong, Justice Kwame Appati
:
Evaluating Dimensionality Reduction Techniques in Bitcoin Ransomware Detection: Comparative Analysis of Incremental PCA and UMAP. - Tian Li

, Qiu-Yu Zhang
, Guo-rui Wu:
Image Traceable Privacy Protection Scheme Based on Blockchain and Homomorphic Encryption. - Ahmed Hawana, Emad S. Hassan

, Walid El-Shafai, Sami A. El-Dolil:
Enhancing Malware Detection With Deep Learning Convolutional Neural Networks: Investigating the Impact of Image Size Variations. - Siranjeevi Rajamanickam, Satyanarayana Vollala

, Natarajan Ramasubramanian:
EEAPTMS: Enhanced ECC Based Authentication Protocol for Telemedical Scenario. - D. J. Joel Devadass Daniel

, Jagadeesh S
:
A Secure Data Storage Architecture for Internet of Things Using a Hybrid Whale-Based Harris Hawk Optimization Algorithm and Fuzzy-Based Secure Clustering. - Abeer Qashou, Nurhidayah Bahar, Hazura Mohamed:

Qualitative Exploration of Data Security Risks in Mobile Cloud Computing for Higher Education. - Guoliang He

:
Construction of Computer Network Security Monitoring Platform Based on Intelligent Sensor Technology. - Garima Verma

:
A Secure Blockchain-Based Health Prediction Framework Using Mantaray Optimization. - Najah K. Almazmomi

:
Advanced Persistent Threat Detection Using Optimized and Hybrid Deep Learning Approach. - Hamidreza Fereidouni

, Olga Fadeitcheva, Mehdi Zalai:
IoT and Man-in-the-Middle Attacks. - Ankur Gupta, Pranshav Patel, Krisha Darji, Fenil Ramoliya, Rajesh Gupta, Sudeep Tanwar

, Karan Khajuria, Deepak Garg:
MetaPrism: Intelligent Personalized Engagement Policy for User's Security and Privacy in Metaverse Environment. - Buchammagari Avinash Reddy, Kshira Sagar Sahoo, Monowar Bhuyan:

Toward Mitigation of Flow Table Modification Attacks in P4-Based SDN Data Plane. - Dulam Devee Sivaprasad

, Mohamed Sirajudeen Yoosuf:
Privacy-Centric Signature Classification for Secure Educational Certificate Authentication.
Erratum
- Correction to "Software-Defined Networks-Enabled Fog Computing for IoT-Based Healthcare: Security, Challenges, and Opportunities".

Research Article
- Hanbing Yu

, Qiju Zhang:
Toward Efficient Secure Threat Information Analysis in Cyber-Physical Systems. - Deyou Chen:

Network Intrusion Detection Technology Integrating Density Peak Clustering Algorithm and Improved Bi-Directional LSTM. - Zakir Ahmad Sheikh, Narinder Verma, Yashwant Singh, Sudeep Tanwar

, Abdulatif Alabdulatif
:
Generalizability Assessment of Learning-Based Intrusion Detection Systems for IoT Security: Perspectives of Data Diversity. - Chethana H. T.

, Trisiladevi C. Nagavi, P. Mahesha, Vinayakumar Ravi
, Alanoud Al Mazroa:
Face Recognition in Unconstrained Images Using Deep Learning Model for Forensics. - Ahmed Almuhairat, Adel Alti

, Boubakeur Annane:
Unified Central Bank Blockchain for Improving Accounting Bank Performance in Jordan. - Ashutosh Tripathi

, Kusum Kumari Bharti, Mohona Ghosh:
An Efficient Algorithm for Exploitative Monetization Scam Video Detection Over Social Media Platforms. - Pralabh Agarwal, Mohammad Wazid

, Vishal Kumar Singh, Anindya Srivastava, Arshal Raj Singh, Saksham Mittal, Ashok Kumar Das
:
BCIDS-IoT: A Binary Classification Intrusion Detection Scheme for Internet of Things Communication.
Volume 8, Number 3, 2025
- Zaheen Fatima, Rashid Hussain, Azhar Dilshad, Muhammad Shakir, Asif Ali Laghari:

Explainable AI-Driven Firewall Evaluation: Empowering Cybersecurity Decision-Making for Optimal Network Defense. - Lixin Jiang

:
A Network Anomaly Traffic Detection Method Based on CNN-LSTM. - Ram Ji

, Neerendra Kumar
, Devanand Padha:
Optimized Intrusion Detection Approach for Cyber-Physical System Using Meta-Learning With Stacked Generalization: An Ensemble Learning Inspired Approach. - Mithun Palani

, Anitha Perumalsamy:
Next-Gen Deepfake Detection: ResNet-Swish-BiLSTM Model to Deliver Superior Accuracy in Visual Forensics. - Correction to "Cascading Bagging and Boosting Ensemble Methods for Intrusion Detection in Cyber-Physical Systems".

- Shtwai Alsubai, Gabriel Avelino R. Sampedro

, Ahmad S. Almadhor, Vincent Karovic, Abdullah Alqahtani, Sidra Abbas
:
Small-UAV GPS Spoofing Attack Detection and Multilabel Classification. - Aarushi, Abhay Chauhan, Savita Wadhawan, Amanpreet Kaur, Sparsh Sharma

:
The Convergence of Blockchain and IoT in Secure Smart Cities: A Survey of Applications, Challenges, and Opportunities. - R. Lalduhsaka

, Ajoy Kumar Khan:
Enhanced Intrusion Detection System Using a Two-Staged Feature Selection Method. - Yuchen Fu, Zhenhui Li

, Feng Huang, Wang Ning, Haoran Lyu
:
Design of a Fast Image Encryption Algorithm Based on a Novel 2D Chaotic Map and DNA Encoding. - Huihui Shi, Hua Shi:

Financial Management and Data Sharing of Enterprise Engineering Projects Based on Blockchain Technology. - Karunya R. V., Samyuktha Ganesh, Muralidharan D, G. R. Brindha

, Muthu Thiruvengadam
:
Credit Card Fraud Data Analysis and Prediction Using Machine Learning Algorithms. - Hakeem Babalola Akande, Agbotiname Lucky Imoize

, Temitayo C. Adeniran, Cheng-Chi Lee
, Joseph Bamidele Awotunde:
RF-FLIDS: A Novel Hybrid Intrusion Detection Model for Enhanced Anomaly Detection in IoT Networks. - Ravi Sharma

, Nonita Sharma, Sachi Nandan Mohanty
:
Attack Detection in Internet of Medical Things Through Ensemble Machine Learning Models. - Zhiying Hu

, Lifeng Wang, Xiaomei Ding, Lihong Zhao, Minghe Xue:
Multimodal Data Fusion Defense Strategy for Campus Network Security: Research on Kolmogorov Arnold Networks Combined With B-Spline Function. - C. Suganthi Evangeline, Vinoth Babu Kumaravelu, Arthi Murugadass, Agbotiname Lucky Imoize

, Poongundran Selvaprabhu, J. Naskath
:
BSHR-FA: A Blockchain-Enabled Secure Hierarchical Routing Using Firefly Algorithm for VANETs. - Shahnwaz Afzal

, Mohammad Ubaidullah Bokhari:
LightAgriCrypt: A Novel Lightweight Stream Cipher for Enhancing Security in Smart Agriculture Systems. - Mohammed Mahyoub

, AbdulAziz AbdulGhaffar, Emmanuel Dare Alalade
, Ashraf Matrawy:
A Security-Aware Network Function Sharing Model for 5G Slicing. - Kruthika S. G.

, Trisiladevi C. Nagavi
, P. Mahesha
, Chethana H. T.
, Vinayakumar Ravi
, Alanoud Al Mazroa:
Identification of Suspect Using Transformer and Cosine Similarity Model for Forensic Voice Comparison. - Oluwadamilare Harazeem Abdulganiyu

, Taha Ait Tchakoucht, Yakub Kayode Saheed, Meryam El Mouhtadi, Ahmed El Hilali Alaoui:
Modified Variational Autoencoder and Attention Mechanism-Based Long Short-Term Memory for Detecting Intrusions in Imbalanced Network Traffic. - G. A. Thushara

, S. Mary Saira Bhanu:
A Blockchain-Assisted Attribute-Based Signcryption for Secure Sharing of Medical IoT Data in Fog Environment. - Hongxuan Hu

, Liang Ding, Guoyang Lu, Xiaobin Cai, Zonghui Wang
:
Malware Detection Method Based on Adversarial Samples and a Hybrid Model.
Volume 8, Number 4, 2025
- Chengman Wang

:
A Mathematical Model for Wireless Network Security Posture Prediction Based on Optimized Neural Network Algorithm. - Hong Li

, Shuang Liu, Taiyue Tang:
User Data Privacy Protection Based on Machine Learning and Encryption Algorithms. - Naga Sravanthi Puppala

:
Mitigating Malicious Activities in Blockchain Mining: The Role of Reputation-Based Protocol. - Weigang Zhang

:
Network Security Situation Prediction Model Based on Neural Network and Gated Recurrent Unit. - Deepak Kumar

, P. Anitha, J. Murugachandravel, S. Jeevitha, A. Bhuvanesh
, Priyanka Pramod Pawar
:
Banking Fraud Detection Using Optimized Enhanced Stacked Autoencoder Approach. - Mukesh Singh, Siddhant Thapliyal, Mohammad Wazid

, Devesh Pratap Singh, Ashok Kumar Das
:
Designing Generative AI-Envisioned Security Scheme for Server Attacks Protection. - Meysam Ghahramani:

Privacy Dream: A Malware Propagation-Inspired Attack on Authentication Protocols. - Fursan Thabit, Ozgu Can

, Chrysostomos Chrysostomou:
Enhancing Data Security With Adaptive ECC-Based Encryption: A Resource-Aware Approach. - Shahida Hafeezan Qureshi, Saif Ur Rehman Malik, Junaid Haseeb, Syed Atif Moqurrab, Tanvir Fatima Naik Bukht, Gautam Srivastava

:
Towards Sustainable IoT: A Digital Signature-Enhanced Federated Learning Approach. - Zaed S. Mahdi

, Rana M. Zaki, Laith Alzubaidi
:
A Secure and Adaptive Framework for Enhancing Intrusion Detection in IoT Networks Using Incremental Learning and Blockchain. - Deepti Saraswat

, Manik Lal Das
, Sudeep Tanwar
:
VeriProd: A Privacy-Preserving and Verifiable FL Framework for Secure Aggregation and Dropout Resilience. - Correction to "Attack Detection in Internet of Medical Things Through Ensemble Machine Learning Models".

- Aqeel Ejaz, Ghulam Murtaza, Takreem Haider

, Naveed Ahmed Azam, Umar Hayat
:
An Efficient S-Box Generation With Mutation Optimization for Secure Image Encryption. - R. Shashidhar

, M. P. Shashank, Vinayakumr Ravi
, Alanoud Al Mazroa:
Audio and Visual Speech for the Biometric Security System. - Mohammed Riyadh Abdmeziem

, Amina Ahmed Nacer:
Leveraging IoT and LLM for Depression and Anxiety Disorders: A Privacy Preserving Perspective. - Sruthi Krishnan

, S. Manohar Naik
:
An Efficient Framework for Phishing URL Detection Using Adaptive Drift-Aware Feature Monitoring and Online Learning. - Daassa Asma, Nesrine Missaoui, Mohsen Machhout, Sonia Ayachi Ghannouchi:

Access Control in BPMSs: A Case Study for Building a Privacy-Preserving COVID-19 Process in Bonita. - Hongbo Liu

:
Security Technology of Unmanned Cluster Communication Network Based on Physical Layer Key Generation Technology. - B. Pradeep Kumar Reddy

, Ayantika Chatterjee:
SMLaaS: Secure Machine Learning as a Service Ensuring Data and Model Parameter Privacy. - Mahbubun Nahar

, A. H. M. Kamal:
DNA Steganography to Enhance Security in Banking Sector. - Swapnil Singh

, Deepa Krishnan
, Pratham Dedhiya, Vinayakumar Ravi
, Darshil Sanghvi, Kamakshya Nanda:
Comprehensive Analysis of Supervised Machine Learning Algorithms in Obfuscated Malware Detection. - Fatemeh Stodt, Mohammed B. Alshawki, Christoph Reich, Péter Ligeti, Fabrice Theoleyre

:
Securing the Future: Lightweight Blockchain Solutions for IIoT and IoT Networks. - Aarav Ashish Mehrishi, Dipti Kapoor Sarmah

, Maya Daneva:
How Can Cryptography Secure Online Assessments Against Academic Dishonesty?
Volume 8, Number 5, 2025
- Roben A. Juanatas, Ahmad S. Almadhor, Shtwai Alsubai, Natalia Kryvinska, Moez Krichen, Gabriel Avelino R. Sampedro

, Sidra Abbas
:
Securing Realistic IoMT Environment Using Moth-Flame Optimization-Based Deep Learning Framework. - Rajat Sood

, Anamika Sharma, Ashima Anand
:
Encryption-Based Twining of Visible and Invisible Watermarking for Secure Transmission of Medical Images. - Ajay Kakkar

, Indu Batra:
Performance Analysis of a Lightweight Image Re-Encryption Scheme for 5G HetNets. - Siqi Peng

, Yao Peng:
Optimization of Malware Detection and Defense Algorithm Based on Hybrid Convolutional Graph Neural Network. - Gabriele Cianfarani, Natalija Vlajic

, Robert Noce:
Automated Risk-Based Cryptoperiod Calculation in ICSs: Analytical Framework and Software Tool. - Khushboo Gupta, Vinod Kumar

, Ram Prakash, Om Pal, Sanjiv Sharma
:
SAKM: A Scalable and Adaptive Key Management for Securing Demand-Response Bidirectional Communications in AMI of Next-Generation Smart Grids. - Zhen Li, Jia Hu

:
Application of Random Forest Model in Predictive Analysis of Network Security Big Data. - Shabbab Ali Algamdi, Abdul Wahid Khan

, Jamshid Ahmad:
A Cyber Security Awareness Model for Distributed Teams. - Yang Lei

:
Mass Estimation and Protection of Network Security Using Inception-LSTM and Bayesian Attack Behavior Correlation. - Anil

, Gunjan Ansari:
Securing Cloud Data With a Blockchain: Innovating AES Encryption via Modified Sine Map Rounds. - Wencheng Lin

:
Design of a Multimodal Network Data Security Detection Model Based on Self-Supervised Learning.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














