default search action
Security and Privacy, Volume 7
Volume 7, Number 1, January/February 2024
Survey articles
- Archan Dhadhania, Jitendra Bhatia, Rachana Mehta, Sudeep Tanwar, Ravi Sharma, Amit Verma:
Unleashing the power of SDN and GNN for network anomaly detection: State-of-the-art, challenges, and future directions. - Yassine Mekdad, Ahmet Aris, Abbas Acar, Mauro Conti, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes.
Research articles
- Ankita Mishra, Mohammad S. Obaidat, Dheerendra Mishra:
Privacy preserving content distribution framework for multidistributor DRM systems. - Mohammed Rauf Ali Khan:
Understanding impacts of a ransomware on medical and health facilities by utilizing LockBit as a case study. - Indu Kumari, Pranav Kumar Singh, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, Danda B. Rawat:
RFPM: A RSU-aided framework for pseudonym management to preserve location privacy in IoV. - B. S. Sharmila, Rohini Nagapadma:
P-DNN: Parallel DNN based IDS framework for the detection of IoT vulnerabilities. - Zeinab Zoghi, Gürsel Serpen:
UNSW-NB15 computer security dataset: Analysis through visualization. - Dominik Schrahe, Thomas Städter:
Privacy preserving vaccinating- and testing-pass for the European Union. - Martijn Dekker, Lampis Alevizos:
A threat-intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision-making. - Shyam Saurabh, Kishore Sinha:
Optimal key pre-distribution schemes from affine resolvable and partially affine resolvable designs. - Ravi Kumar, Samayveer Singh, Deepti Singh, Mohit Kumar, Sukhpal Singh Gill:
A robust and secure user authentication scheme based on multifactor and multi-gateway in IoT enabled sensor networks. - Md. Azharul Islam, Sanjay Madria:
Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation. - Subhas Barman, Samiran Chattopadhyay, Debasis Samanta:
Toward design a secure protocol for updating remotely stored credentials of a crypto-biometric framework for multi-server environment. - Shweta Sankhwar, Rupali Ahuja, Tanya Choubey, Priyanshi Jain, Tanusha Jain, Muskan Verma:
Cybercrime in India: An analysis of crime against women in ever expanding digital space. - Xiaole Su, Yuanchao Hu, Wei Liu, Zhipeng Jiang, Chan Qiu, Jie Xiong, Ju Sun:
A blockchain-based smart contract model for secured energy trading management in smart microgrids.
Volume 7, Number 2, March/April 2024
Survey papers
- Parikshith Nayaka Sheetakallu Krishnaiah, Dayanand Lal Narayan, Kartick Sutradhar:
A survey on secure metadata of agile software development process using blockchain technology. - Hela Makina, Asma Ben Letaifa, Abderrezak Rachedi:
Survey on security and privacy in Internet of Things-based eHealth applications: Challenges, architectures, and future directions. - Abhishek Bisht, Ashok Kumar Das, Debasis Giri:
Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey.
Research articles
- Harshil Sanghvi, Rushir Bhavsar, Vini Hundlani, Lata Gohil, Tarjni Vyas, Anuja Nair, Shivani Desai, Nilesh Kumar Jadav, Sudeep Tanwar, Ravi Sharma, Nagendar Yamsani:
MetaHate: AI-based hate speech detection for secured online gaming in metaverse using blockchain. - Mohammed Riyadh Abdmeziem, Hiba Akli, Rima Zourane:
Nodes selection review for federated learning in the blockchain-based internet of things. - Himanshu Vadher, Pal Patel, Anuja Nair, Tarjni Vyas, Shivani Desai, Lata Gohil, Sudeep Tanwar, Deepak Garg, Anupam Singh:
EEG-based biometric authentication system using convolutional neural network for military applications. - Sandeep Sharma, Prachi Ahlawat, Kavita Khanna:
DeepMDFC: A deep learning based android malware detection and family classification method. - Deepa Rani, Rajeev Kumar, Naveen Chauhan:
A secure framework for IoT-based healthcare using blockchain and IPFS. - Vankamamidi Srinivasa Naresh, Sivaranjani Reddi:
An identity-based secure VANET communication system. - Heba A. Hassan, Ezz El-Din Hemdan, Walid El-Shafai, Mona Shokair, Fathi E. Abd El-Samie:
Detection of attacks on software defined networks using machine learning techniques and imbalanced data handling methods. - Umesh Bodkhe, Sudeep Tanwar:
V2XCom: Lightweight and secure message dissemination scheme for Internet of vehicles. - Vijay Karnatak, Amit Kumar Mishra, Neha Tripathi, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das:
A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications. - Alay Patel, Devam Patel, Riya Kakkar, Parita Rajiv Oza, Smita Agrawal, Sudeep Tanwar, Ravi Sharma, Nagendar Yamsani:
Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities. - N. Joychandra Singh, Nazrul Hoque, Kh Robindro Singh, Dhruba K. Bhattacharyya:
Botnet-based IoT network traffic analysis using deep learning. - Sangeeta Gupta, Premkumar Chithaluru, May El Barachi, Manoj Kumar:
Secure data access using blockchain technology through IoT cloud and fabric environment. - Mubeen Javed, Muhammad Arslan Akram, Adnan Noor Mian, Saru Kumari:
On the security of a novel privacy-preserving authentication scheme for V2G networks. - Grishan Pradhan, Babu R. Dawadi, Abiral Chaulagain, Anish Lal Joshi, Prajal Govinda Vaidya:
Chaos and DNA coding technique for image cryptography. - Upendra Verma, Mayank Sohani:
An efficient lightweight authentication scheme for dew-assisted IoT networks. - Pawan Kumar, Sukhdip Singh:
Enhancing android application security: A novel approach using DroidXGB for malware detection based on permission analysis. - Anusha Vangala, Ashok Kumar Das, Neeraj Kumar, Pandi Vijayakumar, Marimuthu Karuppiah, Youngho Park:
Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service.
Volume 7, Number 3, May/June 2024
Research articles
- Habib Esmaeelzadeh Rostam, Homayun Motameni, Rasul Enayatifar:
Privacy-preserving in the smart healthcare system using steganography and chaotic functions based on DNA. - Jegadeesan Subramani, Maria Azees, Arun Sekar Rajasekaran, Jaime Lloret:
Physically secure and privacy-preserving blockchain enabled authentication scheme for internet of drones. - Zhongming Huang, Feng Wang, Chin-Chen Chang, Xiuqiang Chen:
A new authentication scheme for dynamic charging system of electric vehicles in fog environment. - Harini Bilakanti, Sreevani Pasam, Varshini Palakollu, Sairam Utukuru:
Anomaly detection in IoT environment using machine learning. - Ruiqi Li, Fupeng Li, Peng Xu, Shuiting Du, Bingling Gu:
Location privacy protection of nodes in the perception layer of the Internet of things based on Radio Frequency Identification location aware algorithm. - Kunal Demla, Ashima Anand:
MieWC: Medical image encryption using wavelet transform and multiple chaotic maps. - P. P. Hema, Anchare V. Babu:
Full-duplex jamming for physical layer security improvement in NOMA-enabled overlay cognitive radio networks. - V. V. L. Divakar Allavarpu, Vankamamidi Srinivasa Naresh, A. Krishna Mohan:
Privacy-preserving credit risk analysis based on homomorphic encryption aware logistic regression in the cloud. - Keiichiro Oishi, Yuichi Sei, J. Andrew, Yasuyuki Tahara, Akihiko Ohsuga:
Algorithm to satisfy l-diversity by combining dummy records and grouping. - Osamah Ibrahim Khalaf, Ashokkumar S. R, Sameer Algburi, Anupallavi S, Dhanasekaran Selvaraj, Mhd Saeed Sharif, Wael Elmedany:
Federated learning with hybrid differential privacy for secure and reliable cross-IoT platform knowledge sharing. - Priyabrata Dash, Monalisa Sarma, Debasis Samanta:
Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications. - Ikram Ud Din, Wajahat Ali, Ahmad Almogren, Iehab Al Rassan, Sherali Zeadally:
Using smart grid infrastructure for authentication and data management in Internet of Medical Things.
Survey papers
- Isha Pali, Ruhul Amin, Mohammad Abdussami:
Autonomous vehicle security: Current survey and future research challenges. - Animesh Kumar, Sandip Dutta, Prashant Pranav:
Analysis of SQL injection attacks in the cloud and in WEB applications.
Volume 7, Number 4, July/Augusust 2024
Research article
- Jigna J. Hathaliya, Sudeep Tanwar:
A systematic survey on security and privacy issues of medicine supply chain: Taxonomy, framework, and research challenges. - Mohammed Ali Qasem, Fursan Thabit, Ozgu Can, Ebrahim Naji, Hoda A. Alkhzaimi, Pritam Rajendra Patil, S. B. Thorat:
Cryptography algorithms for improving the security of cloud-based internet of things. - Shahram Ghahremani, Uyen Trang Nguyen:
Comprehensive evaluation of privacy policies using the contextual integrity framework. - Tapesh Sarsodia, Uma Rathore Bhatt, Raksha Upadhyay, Vijay Bhat:
Hybrid KuFaI: A novel secure key generation algorithm using fast independent component analysis for physical layer security techniques. - Sachin Kumar, Akshit Tyagi, Kadambri Agarwal, Saru Kumari, Chien-Ming Chen:
A trustworthy data collection approach from sensor nodes using trust score of mobile vehicles for smart city. - Sonam Yadav, Vivek Dabra, Pradeep Malik, Saru Kumari:
Flaw and amendment of Dharminder et al.'s authentication protocol for satellite communication. - Asmaa Amer Qasem, Mona Shokair, Fathi E. Abd El-Samie:
Physical-layer security enhancement in wireless sensor networks through artificial noise optimization. - Amith Murthy, Muhammad Rizwan Asghar, Wanqing Tu:
A lightweight Intrusion Detection for Internet of Things-based smart buildings. - Umesh Bodkhe, Sudeep Tanwar:
Secure and lightweight message dissemination framework for internet of vehicles. - Usha Jain:
Secure, light-weight and dynamic PUF-based mutual device authentication mechanism in industrial IoT networks.
Volume 7, Number 5, September/October 2024
Tutorial
- Raut Omprakash Jagannath, Ankit Kumar Jain:
Browser-in-the-middle attacks: A comprehensive analysis and countermeasures.
Survey Paper
- Tamara Finogina, Jordi Cucurull-Juan, Núria Costa:
Selective comparison of verifiable online voting systems. - Mohammed El-Hajj, Taru Itäpelto, Teklit Haftu Gebremariam:
Systematic literature review: Digital twins' role in enhancing security for Industry 4.0 applications. - Hira Rasheed, Rafidah Md Noor, Norjihan Binti Abdul Ghani, Iftikhar Ahmad:
Preserving location-query privacy in location-based services: A review.
Research Article
- Ashutosh Aithekar, Pratik Gupta, Dharminder Chaudhary:
A secure and efficient heterogeneous ID-based signcryption for unmanned aerial vehicular networking system. - Sakhi Bandyopadhyay, Subhadip Mukherjee, Somnath Mukhopadhyay, Sunita Sarkar:
Parallel BFS through pennant data structure with reducer hyper-object based data hiding for 3D mesh images. - Ahmed J. Kadhim, Tayseer S. Atia:
Quantum encryption of healthcare images: Enhancing security and confidentiality in e-health systems. - Vahid Bakhtiary, Amir Masoud Rahmani:
Blockchain integration in big data: Review, vision, and opportunities. - Haiyue Chen, Xiangfu Zhao, Yichen Wang, Zixian Zhen:
SafeCheck: Detecting smart contract vulnerabilities based on static program analysis methods. - Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, Asma Aid:
Malicious clouds coalition management for business processes deployment. - Sabyasachi Samanta, Sudipta Roy, Abhijit Sarkar, Dipak Kumar Jana:
Linguistic response surface methodology approach to measure the quality of nonlinear frame-pixel and bit place-based video steganography. - Ahmed Moumena, Imane Saim Haddache:
Intelligent jamming detection-based robust principal components analysis in communication system for security and defense. - Mahendra Prasad, Pankaj Pal, Sachin Tripathi, Keshav P. Dahal:
AI/ML driven intrusion detection framework for IoT enabled cold storage monitoring system. - Bjorn Oude Roelink, Mohammad El-Hajj, Dipti Kapoor Sarmah:
Systematic review: Comparing zk-SNARK, zk-STARK, and bulletproof protocols for privacy-preserving authentication. - Suhaima Jamal, Hayden Wimmer, Iqbal H. Sarker:
An improved transformer-based model for detecting phishing, spam and ham emails: A large language model approach. - Bhabesh Mali, Pranav Kumar Singh, Nabajyoti Mazumdar:
SAFe-Health: Guarding federated learning-driven smart healthcare with federated defense averaging against data poisoning. - Garima Thakur, Mohammad S. Obaidat, Piyush Sharma, Sunil Prajapat, Pankaj Kumar:
An efficient provably secure authentication and key agreement protocol for satellite communication networks. - Radhika Lama, Sandip Karmakar:
SiSMA-SWMS: Signature-based Secure Monitoring Approach for Smart Waste Monitoring Systems. - Sabra Ben Saad:
A trust distributed learning (D-NWDAF) against poisoning and byzantine attacks in B5G networks. - Dheerendra Mishra, Komal Pursharthi:
Cryptanalysis with improvement on lattice-based authenticated key exchange protocol for mobile satellite communication networks. - Minhaj Khan, Mohd. Haroon:
Ensemble random forest and deep convolutional neural networks in detecting and classifying the multiple intrusions from near real-time cloud datasets. - Rizwan Uz Zaman Wani, Fursan Thabit, Ozgu Can:
Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: A systematic review. - Shi Jin, Yichun Wang, Zhaofeng Guo, Li Yang, Xiaosan Su:
Short message encryption technology of Beidou communication based on SM9. - Zahraa A. Mohammed, Khalid Ali Hussein:
PRC6: Hybrid lightweight cipher for enhanced cloud data security in parallel environment.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.