Most Cited Articles

Open access

ISSN: 2772-9184

Cyber security: State of the art, challenges and future directions

Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends

Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments

Efficient time-oriented latency-based secure data encryption for cloud storage

Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review

Bilinear pairing-based access control and key agreement scheme for smart transportation

A survey on scalable consensus algorithms for blockchain technology

Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory

Mutual information based logistic regression for phishing URL detection

Authentication, access control and scalability models in Internet of Things Security–A review

A survey on intrusion detection system in IoT networks

Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings

Quantum communication with RLP quantum resistant cryptography in industrial manufacturing

Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing

An application for predicting phishing attacks: A case of implementing a support vector machine learning model

Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system

A review of deep learning models to detect malware in Android applications

A decentralised KYC based approach for microfinance using blockchain technology

A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact

Novel hybrid deep learning based cyber security threat detection model with optimization algorithm

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.