Stop the war!
Остановите войну!
for scientists:
default search action
Security and Privacy, Volume 7
Volume 7, Number 1, January/February 2024
SURVEY ARTICLES
- Archan Dhadhania, Jitendra Bhatia, Rachana Mehta, Sudeep Tanwar, Ravi Sharma, Amit Verma:
Unleashing the power of SDN and GNN for network anomaly detection: State-of-the-art, challenges, and future directions. - Yassine Mekdad, Ahmet Aris, Abbas Acar, Mauro Conti, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes.
RESEARCH ARTICLES
- Ankita Mishra, Mohammad S. Obaidat, Dheerendra Mishra:
Privacy preserving content distribution framework for multidistributor DRM systems. - Mohammed Rauf Ali Khan:
Understanding impacts of a ransomware on medical and health facilities by utilizing LockBit as a case study. - Indu Kumari, Pranav Kumar Singh, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, Danda B. Rawat:
RFPM: A RSU-aided framework for pseudonym management to preserve location privacy in IoV. - B. S. Sharmila, Rohini Nagapadma:
P-DNN: Parallel DNN based IDS framework for the detection of IoT vulnerabilities. - Zeinab Zoghi, Gürsel Serpen:
UNSW-NB15 computer security dataset: Analysis through visualization. - Dominik Schrahe, Thomas Städter:
Privacy preserving vaccinating- and testing-pass for the European Union. - Martijn Dekker, Lampis Alevizos:
A threat-intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision-making. - Shyam Saurabh, Kishore Sinha:
Optimal key pre-distribution schemes from affine resolvable and partially affine resolvable designs. - Ravi Kumar, Samayveer Singh, Deepti Singh, Mohit Kumar, Sukhpal Singh Gill:
A robust and secure user authentication scheme based on multifactor and multi-gateway in IoT enabled sensor networks. - Md. Azharul Islam, Sanjay Madria:
Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation. - Subhas Barman, Samiran Chattopadhyay, Debasis Samanta:
Toward design a secure protocol for updating remotely stored credentials of a crypto-biometric framework for multi-server environment. - Shweta Sankhwar, Rupali Ahuja, Tanya Choubey, Priyanshi Jain, Tanusha Jain, Muskan Verma:
Cybercrime in India: An analysis of crime against women in ever expanding digital space. - Xiaole Su, Yuanchao Hu, Wei Liu, Zhipeng Jiang, Chan Qiu, Jie Xiong, Ju Sun:
A blockchain-based smart contract model for secured energy trading management in smart microgrids.
Volume 7, Number 2, March/April 2024
SURVEY PAPERS
- Parikshith Nayaka Sheetakallu Krishnaiah, Dayanand Lal Narayan, Kartick Sutradhar:
A survey on secure metadata of agile software development process using blockchain technology. - Hela Makina, Asma Ben Letaifa, Abderrezak Rachedi:
Survey on security and privacy in Internet of Things-based eHealth applications: Challenges, architectures, and future directions. - Abhishek Bisht, Ashok Kumar Das, Debasis Giri:
Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey.
RESEARCH ARTICLES
- Harshil Sanghvi, Rushir Bhavsar, Vini Hundlani, Lata Gohil, Tarjni Vyas, Anuja Nair, Shivani Desai, Nilesh Kumar Jadav, Sudeep Tanwar, Ravi Sharma, Nagendar Yamsani:
MetaHate: AI-based hate speech detection for secured online gaming in metaverse using blockchain. - Mohammed Riyadh Abdmeziem, Hiba Akli, Rima Zourane:
Nodes selection review for federated learning in the blockchain-based internet of things. - Himanshu Vadher, Pal Patel, Anuja Nair, Tarjni Vyas, Shivani Desai, Lata Gohil, Sudeep Tanwar, Deepak Garg, Anupam Singh:
EEG-based biometric authentication system using convolutional neural network for military applications. - Sandeep Sharma, Prachi Ahlawat, Kavita Khanna:
DeepMDFC: A deep learning based android malware detection and family classification method. - Deepa Rani, Rajeev Kumar, Naveen Chauhan:
A secure framework for IoT-based healthcare using blockchain and IPFS. - Vankamamidi Srinivasa Naresh, Sivaranjani Reddi:
An identity-based secure VANET communication system. - Heba A. Hassan, Ezz El-Din Hemdan, Walid El-Shafai, Mona Shokair, Fathi E. Abd El-Samie:
Detection of attacks on software defined networks using machine learning techniques and imbalanced data handling methods. - Umesh Bodkhe, Sudeep Tanwar:
V2XCom: Lightweight and secure message dissemination scheme for Internet of vehicles. - Vijay Karnatak, Amit Kumar Mishra, Neha Tripathi, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das:
A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications. - Alay Patel, Devam Patel, Riya Kakkar, Parita Rajiv Oza, Smita Agrawal, Sudeep Tanwar, Ravi Sharma, Nagendar Yamsani:
Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities. - N. Joychandra Singh, Nazrul Hoque, Kh Robindro Singh, Dhruba K. Bhattacharyya:
Botnet-based IoT network traffic analysis using deep learning. - Sangeeta Gupta, Premkumar Chithaluru, May El Barachi, Manoj Kumar:
Secure data access using blockchain technology through IoT cloud and fabric environment. - Mubeen Javed, Muhammad Arslan Akram, Adnan Noor Mian, Saru Kumari:
On the security of a novel privacy-preserving authentication scheme for V2G networks. - Grishan Pradhan, Babu R. Dawadi, Abiral Chaulagain, Anish Lal Joshi, Prajal Govinda Vaidya:
Chaos and DNA coding technique for image cryptography. - Upendra Verma, Mayank Sohani:
An efficient lightweight authentication scheme for dew-assisted IoT networks. - Pawan Kumar, Sukhdip Singh:
Enhancing android application security: A novel approach using DroidXGB for malware detection based on permission analysis. - Anusha Vangala, Ashok Kumar Das, Neeraj Kumar, Pandi Vijayakumar, Marimuthu Karuppiah, Youngho Park:
Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.