Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends
December 2023
Healthcare information security is becoming a significant responsibility for all healthcare organisations and individuals. Innovative medical equipment and healthcare apps are vital to patient care,...
Share article
Cyber security: State of the art, challenges and future directions
2024
Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems....
Share article
Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN
December 2023
•Reviews the current state-of-the-art access control deployed in businesses.•Reviews emerging and innovating access control in recent literature.•Applies access control to four domains: cloud, IoT,...
Share article
Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security
2024
•Investigates machine learning (ML) algorithms for intrusion detection.•Uses large data set of 126,000 samples from NSL-KDD for experiments.•Analyses random projection and principal component analysis's...
Share article
Any Bluetooth device can be hacked. Know how?
2024
In today's world, Bluetooth technology is integrated into almost every device we use, from wireless headsets, mice, and keyboards to cars and smart home devices. But with the convenience of this technology...
Share article
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact
2024
•We propose a secure deepfake mitigation framework using Elliptic Curve Cryptography (ECC)-based signature and encryption schemes.•The architecture of deepfake mitigation framework through general guidelines...
Share article
Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments
2024
Vehicular ad-hoc network (VANET) technology has gained prominence, especially in the context of the emerging field of VANET Cloud as an integral part of connected and autonomous vehicles. The automotive...
Share article
An application for predicting phishing attacks: A case of implementing a support vector machine learning model
2024
The imminent threat that phishing websites poses is a major concern for internet users worldwide. These fraudulent websites are crafted by cyber attackers to appear trustworthy and deceive vulnerable...
Share article
Security analysis of cyber physical system using digital forensic incident response
2024
There is a great demand for an efficient security tool which can secure IIoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IIoT considering...
Share article
Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review
December 2023
The fast growth of the cloud computing technology has led to immense development in the public and private sectors. Cloud computing provides a high level of virtualization, massive scalability, multitenancy...
Share article
A blockchain-based anonymous reporting system with no central authority: Architecture and protocol
2024
•Embedding a private blockchain into a public blockchain.•Submitting reports on a public blockchain anonymously.•Using ring signature to provide anonymity.•Removing central authority.•Applying a secret...
Share article
Efficient time-oriented latency-based secure data encryption for cloud storage
2024
To ensure data security in the cloud, there exist several techniques proposed by various researchers. The most common method is the usage of data encryption techniques like profile, rule, and attribute-based...
Share article
A review of deep learning models to detect malware in Android applications
December 2023
Android applications are indispensable resources that facilitate communication, health monitoring, planning, data sharing and synchronization, social interaction, business and financial transactions....
Share article
A decentralised KYC based approach for microfinance using blockchain technology
December 2023
•The proposed lending model eliminates the middle parties like banks in the loan process. It decreases the time taken to a great extent.•The proposed decentralised KYC model eliminates a lot of human...
Share article
An advanced and secure framework for conducting online examination using blockchain method
December 2023
Nowadays, the online platform has been used by many educational institutions, to conduct tests, especially for secondary to tertiary level students. The most popular online test program is run by providing...
Share article
Quantum communication with RLP quantum resistant cryptography in industrial manufacturing
December 2023
This paper presents the best outcome of the Quantum communication use case of industrial manufacturing, using quantum theory to achieve secure data transfer between industrial production facilities...
Share article
Colour image encryption algorithm using Rubik’s cube scrambling with bitmap shuffling and frame rotation
2024
The 21st century has seen a significant increase in the usage of multimedia to transfer information. Algorithms used for the encryption of plain text are not suitable for multimedia encryption. This...
Share article
E-Brightpass: A Secure way to access social networks on smartphones
2024
Social network providers offer a variety of entertainment services in exchange for end users’ personal information, such as their identity. The majority of users access social networking sites via their...
Share article
Mutual information based logistic regression for phishing URL detection
2024
Phishing is a cybersecurity problem that hackers employ to deceive individuals and organizations. Phishing is dynamic in nature; the hackers change several tricks to deceive the victims in multiple...
Share article
A three-factor mutual authentication scheme for telecare medical information system based on ECC
2024
In critical pandemic situations, the Telecare Medical Information System (TMIS) is a technological invention that offers secure and authentic patient registration and medical services remotely. Wireless...
Share article
Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory
December 2023
Ad hoc networks are a new perspective of wireless communication for versatile hosts. Security is a colossal worry for ad hoc networks, especially for those security-touchy applications. The huge highlights...
Share article
An efficient IoT group association and data sharing mechanism in edge computing paradigm
December 2023
Despite its benefits and promising future, security and privacy challenges for the IoT wireless communication of edge computing environment remain unaddressed. As a result, proper authentication mechanisms...
Share article
A novel dual optimized IDS to detect DDoS attack in SDN using hyper tuned RFE and deep grid network
2024
Technological advancement is one of the factors contributing to a rise of susceptible cyberattacks. Distributed denial of service (DDoS) attack reduces the efficiency of network servers by saturating...
Share article
Automatic generation of security protocols attacks specifications and implementations
2024
Confidence in a communication protocol’s security is a key requirement for its deployment and long-term maintenance. Checking if a vulnerability exists and is exploitable requires extensive expertise....
Share article
Quantum vs post‐quantum security for future networks: Survey
2024
Classical cryptography (crypt) schemes (sche) have been compromised by the practical results on quantum (q) computers in recent years. Nowadays these sche ‘s can be compromised by using the Shor's methodology....
Share article